دانلود و نمایش مقالات مرتبط با ایمنی و امنیت::صفحه 1
دانلود بهترین مقالات isi همراه با ترجمه فارسی 2

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - ایمنی و امنیت

تعداد مقالات یافته شده: 8
ردیف عنوان نوع
1 Securing instant messaging based on blockchain with machine learning
ایمن سازی پیام های فوری بر اساس blockchain با یادگیری ماشین-2019
Instant Messaging (IM) offers real-time communications between two or more participants on Internet. Nowadays, most IMs take place on mobile applications, such as WhatsApp, WeChat, Viber and Facebook Messenger, which have more users than social networks, such as Twitter and Facebook. Among the applications of IMs, online shopping has become a part of our everyday life, primarily those who are busiest. However, transaction disputes are often occurred online shopping. Since most IMs are centralized and message history is not stored in the center, the messaging between users and owners of online shops are not reliable and traceable. In China, online shopping sales have soared from practically zero in 2003 to nearly 600 hundred million dollars last year, and now top those in the United States. It is very crucial to secure the instant messaging in online shopping in China. We present techniques to exploit blockchain and machine learning algorithms to secure instant messaging. Since the cryptography of Chinese national standard is encouraged to adopt in security applications of China, we propose a blockchain-based IM scheme with the Chinese cryptographic bases. First, we design a message authentication model based on SM2 to avoid the counterfeit attack and replay attack. Second, we design a cryptographic hash mode based on SM3 to verify the integrity of message. Third, we design a message encryption model based on SM4 to protect the privacy of users. Besides, we propose a method based on machine learning algorithms to monitor the activity on blockchain to detect anomaly. To prove and verify the blockchain-based IM scheme, a blockchain-based IM system has been designed on Linux platforms. The implementation result shows that it is a practical and secure IM system, which can be applied to a variety of instant messaging applications directly
Keywords: Instant Messaging (IM) | BlockChain | Machine learning | Distributed Ledger Technology (DLT) | Safety and security
مقاله انگلیسی
2 Securing instant messaging based on blockchain with machine learning
ایمن سازی پیام های فوری بر اساس blockchain با یادگیری ماشین-2019
Instant Messaging (IM) offers real-time communications between two or more participants on Internet. Nowadays, most IMs take place on mobile applications, such as WhatsApp, WeChat, Viber and Facebook Messenger, which have more users than social networks, such as Twitter and Facebook. Among the applications of IMs, online shopping has become a part of our everyday life, primarily those who are busiest. However, transaction disputes are often occurred online shopping. Since most IMs are centralized and message history is not stored in the center, the messaging between users and owners of online shops are not reliable and traceable. In China, online shopping sales have soared from practically zero in 2003 to nearly 600 hundred million dollars last year, and now top those in the United States. It is very crucial to secure the instant messaging in online shopping in China. We present techniques to exploit blockchain and machine learning algorithms to secure instant messaging. Since the cryptography of Chinese national standard is encouraged to adopt in security applications of China, we propose a blockchain-based IM scheme with the Chinese cryptographic bases. First, we design a message authentication model based on SM2 to avoid the counterfeit attack and replay attack. Second, we design a cryptographic hash mode based on SM3 to verify the integrity of message. Third, we design a message encryption model based on SM4 to protect the privacy of users. Besides, we propose a method based on machine learning algorithms to monitor the activity on blockchain to detect anomaly. To prove and verify the blockchain-based IM scheme, a blockchain-based IM system has been designed on Linux platforms. The implementation result shows that it is a practical and secure IM system, which can be applied to a variety of instant messaging applications directly.
Keywords: Instant Messaging (IM) | BlockChain | Machine learning | Distributed Ledger Technology (DLT) | Safety and security
مقاله انگلیسی
3 STPA-SafeSec: Safety and security analysis for cyber-physical systems
STPA-SafeSec: تجزیه و تحلیل ایمنی و امنیت سیستم های فیزیکی سایبری-2017
Article history:Available online 30 June 2016Keywords:Smart gridSynchronous islanded generation STPACPSSafetyCyber securityCyber-physical systems tightly integrate physical processes and information and communication technolo- gies. As today’s critical infrastructures, e.g., the power grid or water distribution networks, are complex cyber-physical systems, ensuring their safety and security becomes of paramount importance. Traditional safety analysis methods, such as HAZOP, are ill-suited to assess these systems. Furthermore, cybersecu- rity vulnerabilities are often not considered critical, because their effects on the physical processes are not fully understood. In this work, we present STPA-SafeSec, a novel analysis methodology for both safety and security. Its results show the dependencies between cybersecurity vulnerabilities and system safety. Us- ing this information, the most effective mitigation strategies to ensure safety and security of the system can be readily identified. We apply STPA-SafeSec to a use case in the power grid domain, and highlight its benefits.© 2016 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY license. (http://creativecommons.org/licenses/by/4.0/)
Keywords: Smart grid | Synchronous islanded generation | STPA | CPS | Safety | Cyber security
مقاله انگلیسی
4 چالش های برنامه اقامتی مبتنی بر اجتماع در ساباه، مالزی: امیدوار یا ناامید؟
سال انتشار: 2017 - تعداد صفحات فایل pdf انگلیسی: 9 - تعداد صفحات فایل doc فارسی: 32
این مقاله چالشهای پیش روی شرکت کنندگان در برنامه اقامت مبتنی بر اجتماع را در دهکده داگات واقع در جزایر خشکی کیناباتانگان – سگاما در ساباه مالزی را بررسی می کند. داده های اولیه ازطریق مشاهدات میدانی و مصاحبه های عمیق انجام شده با شرکت کنندگان در سپتامبر 2015 و مارس 2016 جمع آوری شد. نتایج این مطالعه نشان داد که فعالیتهای گردشگری مبتنی بر برنامه اقامت در دهکده داگات این توانایی را دارند که به دلیل منابع طبیعی فراوان آن توسعه یابند اما پی برده شده است که جامعه محلی درطی عملیات اقامتشان در محل مورد مطالعه با چالشهای بسیاری روبرو بوده است که شامل فقدان توسعه زیرساختی، فعالیت ضعیف ترویجی، فقدان منابع انسانی، مسائل ایمنی و امنیتی و رهبری ضعیف محلی می شود. بنابراین این مطالعه اهمیت همکاری و مشارکت دربین ذی نفعان گردشگری را به منظور دستیابی به یک توسعه گردشگری محلی موفق، توصیه می کند.
کلیدواژه ها: گردشگری مبتنی بر اجتماع | مشارکت اجتماعی | چالش ها | جزایر خشکی کیناباتانگان – سگامای پایینی
مقاله ترجمه شده
5 Recent Development in Big Data Analytics for Business Operations and Risk Management
توسعه اخیر در تجزیه و تحلیل داده های بزرگ برای عملیات تجاری و مدیریت ریسک-2017
“Big data” is an emerging topic and has attracted the attention of many researchers and practitioners in industrial systems engineering and cybernetics. Big data analytics would definitely lead to valuable knowledge for many organizations. Business operations and risk management can be a beneficiary as there are many data collection channels in the related industrial systems (e.g., wireless sensor networks, Internet-based systems, etc.). Big data research, however, is still in its infancy. Its focus is rather unclear and related studies are not well amalgamated. This paper aims to present the challenges and opportunities of big data analytics in this unique application domain. Technological development and advances for industrialbased business systems, reliability and security of industrial systems, and their operational risk management are examined. Important areas for future research are also discussed and revealed.
Index Terms: Big data analytics | business intelligence (BI) | operational risk analysis | operations management | systems relia bility and security
مقاله انگلیسی
6 Safety and Security of Passenger Terminal: the Case Study of Riga International Coach Terminal
ایمنی و امنیت ترمینال مسافری: مطالعه موردی ترمینال بین المللی مرکز ریگا-2017
This paper presents the Riga International Coach Terminal safety and security management system. Authors analyse European documents and tendency to ensure adequate security in the operation of Passenger Terminal and present RICT security risk-based decision-making approach. It is based on the security organization setup, which includes interfaces with internal and external bodies and strategy based on risk management, implemented through a structured security, risk management process. These results and initiatives in Riga International Coach Terminal are important steps to create safeguard of the "sustainability" perspective, which implementation in whole redefine the RICT reliable node of public transport.
Keywords: passenger terminal | safety | security | risk | analysis | process | management
مقاله انگلیسی
7 A Survey of Approaches Combining Safety and Security for Industrial Control Systems
بررسی رویکردهای ترکیبی از ایمنی و امنیت برای سیستم های کنترل صنعتی-2015
The migration towards digital control systems creates new security threats that can endanger the safety of industrial infrastructures. Addressing the convergence of safety and security concerns in this context, we provide a comprehensive survey of existing approaches to industrial facility design and risk assessment that consider both safety and security. We also provide a comparative analysis of the different approaches identified in the literature. Keywords: Safety; Security; Risk assessment process; Standards; Cyber Physical Systems.
مقاله انگلیسی
8 CloRExPa: انعطاف پذیری ابر از طریق تحلیل مسیر اجرا
سال انتشار: 2014 - تعداد صفحات فایل pdf انگلیسی: 12 - تعداد صفحات فایل doc فارسی: 41
با وجود افزایش علاقه مندی در اطراف مفاهیم ابر ، فن آوری ابری کنونی و خدمات مربوط به امنیت ، برای فراهم کردن موجبات پذیرش صنعت گسترده سیستم های ابری ، به حد کافی کامل نیست . ایجاد سطحی کافی از انعطاف پذیری برای خدمات ابری با توجه به پیچیدگی محیط و نیز نیاز به راه حل های کارآمد که می تواند منافع ابر را بر راه حل های دیگر حفظ کند ، یکی از مشکلات است . در این مقاله طرح معماری ، جزئیات پیاده سازی و نتایج عملکرد ارائه شده برای یک راه حل خدمات انعطاف پذیری قابل تنظیم برای مهمانان ابر را ارائه میکنیم . این راه حل نيرو مند سازي تجزیه و تحلیل مسیر است . به طور خاص ، ما یک معماری پیشنهاد میکنیم که می تواند فعالیت ماشین مجازی های فعال و همچنین کد مداخله و تغییرات داده ها ، که احتمالابا توجه به حملات مخرب و مشکلات نرم افزاری بوجود می آید را ردیابی ، تجزیه و تحلیل و کنترل کند . تجزیه و تحلیل مسیر اجرا اجازه می دهد تا مدیریت ماشین مجازی (VMM) وضعیت VM را برای جلوگیری از رسیدن چنین مهمانی به وضعیت معیوب را ردیابی کند . ما اثربخشی و عملکرد مبادله نمونه پيشنهاديمان را در یک بستر واقعی آزمون ابر ارزیابی کردیم . نتایج تجربی از عملی بودن راه حل پیشنهادی پشتیبانی میکند .
کلمات کلیدی: مدیریت محاسبات ابری | انعطاف پذیری | تجزیه و تحلیل مسیر اجرا | مسائل مربوط به ایمنی و امنیت در ابر | مبادله عملکرد امنیتی
مقاله ترجمه شده
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 12937 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 12937 :::::::: افراد آنلاین: 86