Academia.eduAcademia.edu

Information Security and Assurance

description235 papers
group106 followers
lightbulbAbout this topic
Information Security and Assurance is the practice of protecting information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. It encompasses the policies, procedures, and technologies designed to safeguard data integrity, confidentiality, and availability, ensuring that information remains secure and trustworthy throughout its lifecycle.
lightbulbAbout this topic
Information Security and Assurance is the practice of protecting information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. It encompasses the policies, procedures, and technologies designed to safeguard data integrity, confidentiality, and availability, ensuring that information remains secure and trustworthy throughout its lifecycle.
Journaling is a relatively new feature of modern file systems that is not yet exploited by most digital forensic tools. A file system journal caches data to be written to the file system to ensure that it is not lost in the event of a... more
This article proposes a methodology for obtaining a cryptographic algorithm, optimized for wireless sensor networks, through genetic algorithm. With the objective of increasing the level of security, computational efficiency and... more
In this paper we investigate the performance limits of system call based monitoring tools using the Linux version of Sebek as a focal point. We quantify the amount of uninteresting data that it collects and illustrate the problems that... more
The quest of the last ten years for high power snubberless semiconductor switches has resulted in IGCTs (integrated gate-commutated thyristors) and IGBTs (insulated-gate bipolar transistors) currently available up to 6 kV. Both devices... more
The iris recognition technology is the most accurate, fast and less invasive one compared to other biometric techniques using for example fingerprints, face, retina, hand geometry, voice or signature patterns. The system developed in this... more
The iris recognition technology is the most accurate, fast and less invasive one compared to other biometric techniques using for example fingerprints, face, retina, hand geometry, voice or signature patterns. The system developed in this... more
This paper presents a lumped-parameter magnetic model for an interior permanent-magnet synchronous machine. The model accounts for the effects of saturation through a nonlinear reluctance-element network used to estimate the -axis... more
Many digital image watermarking schemes have been developed to embed copyright information into an image. However, an attacker may reuse parts of a watermarked image by cropping out unwanted parts. Several techniques have been designed to... more
A detailed analysis of the performance of 2×2 Multiple Input Multiple Output (MIMO) antenna systems has been carried out by determining the transmit diversity using Alamouti Space Time Block Coding (STBC) techniques. The transmission... more
As technology evolves, so does the threat of cyberattacksmaking Digital Forensics crucial for damage control and prevention. This paper aims to address the inefficiencies faced by investigators in a forensic setting by automating the... more
As technology evolves, so does the threat of cyberattacks – making Digital Forensics crucial for damage control and prevention. This paper aims to address the inefficiencies faced by investigators in a forensic setting by automating the... more
Classification in intrusion detection data set becomes complex due to its high dimensionality. To reduce the complexity, significant attributes for classification called as features in the data set needs to be identified. Numbers of... more
Efficient watermarking techniques guarantee inaudibility and robustness against signal degradation. Spread spectrum watermarking technique makes it harder for unauthorized adversary to detect the position of the embedded watermark in the... more
Authenticated encryption (AE) has been a vital operation in cryptography due to its ability to provide confidentiality, integrity, and authenticity at the same time. Its use has soared in parallel with widespread use of the internet and... more
Authenticated encryption (AE) has been a vital operation in cryptography due to its ability to provide confidentiality, integrity, and authenticity at the same time. Its use has soared in parallel with widespread use of the Internet and... more
Authenticated encryption (AE) has been a vital operation in cryptography due to its ability to provide confidentiality, integrity, and authenticity at the same time. Its use has soared in parallel with widespread use of the internet and... more
This paper presents a genetic algorithm (GA) for generating efficient rules for cost-sensitive misuse detection in intrusion detection systems. The GA employs only the five most relevant features for each attack category for rule... more
The Multiple Channel per Carrier (MCPC) is considered an efficient alternative when used in Ground Station (GS) TV channel stations as it accommodate multiple channel on a limited frequency range. The MCPC technique has been widely used... more
Elliptic Curve Cryptography (ECC) can be used as a tool for encrypting data, creating digital signatures or performing key exchanges. In relation to encryption, the Elliptic Curve Integrated Encryption Scheme (ECIES) is the best known... more
Nowadays, where the technology dominates every field and activity like transaction, learning activities, private or corporate data storage, and so on are things that we have to look in detail especially in terms of security both in data... more
A new control scheme to extend the speed range of a four-pole induction machine is investigated. A three-phase stator winding is used with each of two coil groups per phase being independent resulting in a six-coupled circuit,... more
In this paper we propose two families of block ciphers, Simon and Speck, each of which comes in a variety of widths and key sizes. While many lightweight block ciphers exist, most were designed to perform well on a single platform and... more
Attribute relations in access control mechanisms or languages allow accurate and efficient specification of some popular access control models. However, most of the access control systems including today's de-facto access control protocol... more
(NIST) is the official series of publications relating to standards and guidelines adopted and promulgated under the provisions of the Federal Information Security Management Act (FISMA) of 2002.
The FIDO (Field Integrated Design & Operations) rover is an advanced mobility platform and research prototype for future Mars surface missions planned by NASA. It was used in a recent field trial aimed at realistic simulation of the 2003... more
In this paper, we present a novel technique for embedding digital \watermarks" into digital audio signals. Watermarking is a technique used t o l a b el digital media by hiding copyright or other information into the underlying data. The... more
In partial fulfilment of the requirements for Master of Commerce in Information Systems Degree (INF5004W) The successful completion of this task would have never been possible without the support, advice, assistance and encouragement of... more
The swift progression in internet networking services has led to massive growth in various multimedia applications such as images, audio files, video files etc. This web revolution has made it feasible and simpler to transmit digital... more
Abstract. Hardware acceleration of cryptographic algorithms is beneficial be-cause considerable performance improvements can be attained compared to software implementations. Thus, hardware implementations can be used in crit-ical... more
Audio watermarking is a technique, which can be used to embed information into the digital representation of audio signals. The main challenge is to hide data representing some information without compromising the quality of the... more
Most of published audio watermark algorithms are suffered a trade-off between inaudibility and detectibility, and the detection performance depends greatly on the strength of noise added by communication channels. This work introduces an... more
In this work, we present a configurable encryption system based on the Encryption by Synchronization in a Cellular Automata (ESCA) system, which is a symmetric key algorithm based on the synchronization phenomenon of Cellular Automata... more
Efficient watermarking techniques guarantee inaudibility and robustness against signal degradation. Spread spectrum watermarking technique makes it harder for unauthorized adversary to detect the position of the embedded watermark in the... more
The Lack of security policy enforcement in web development languages is one of the most important challenges in web application systems development, as there is no formal check for security policy violation that may occur during web... more
MIMO (Multiple Input Multiple Output)-OFDM (Orthogonal Frequency Division Multiplexing) technique is most attractive techniques in wireless communication system and it is very popular for high data rate capacity and against multipath... more
To protect user privacy and meet law regulations, federated (machine) learning is obtaining vast interests in recent years. The key principle of federated learning is training a machine learning model without needing to know each user’s... more
Validation and verification of security policies is a critical and important task to ensure that access control policies are error free. The two most common problems present in access control policies are: inconsistencies and... more
Popular E-commerce portals such as Amazon and eBay require user personal data to be stored on their servers for serving these users with personalized recommendations. These recommendations are derived by virtue of collaborative filtering.... more
Ensuring communications security in Wireless Sensor Networks (WSNs) indeed is critical; due to the criticality of the resources in the sensor nodes as well as due to their ubiquitous and pervasive deployment, with varying attributes and... more
A new control scheme to extend the speed range of a four-pole induction machine is investigated. A three-phase stator winding is used with each of two coil groups per phase being independent resulting in a six-coupled circuit,... more
Journaling is a relatively new feature of modern file systems that is not yet exploited by most digital forensic tools. A file system journal caches data to be written to the file system to ensure that it is not lost in the event of a... more
The use of digital forensic tools by law enforcement agencies has made it difficult for malicious individuals to hide potentially incriminating evidence. To combat this situation, the hacker community has developed anti-forensic tools... more
For quite a long time, computer security was a rather narrow field of study that was populated mainly by theoretical computer scientists, electrical engineers, and applied mathematicians. With the proliferation of open systems in general,... more
Self-recovery schemes identify and restore tampering, using as a reference a compressed representation of a signal embedded into itself. In addition, audio self-recovery must comply with a transparency threshold, adequate for applications... more
The FIDO (Field Integrated Design & Operations) rover is an advanced mobility platform and research prototype for future Mars surface missions planned by NASA. It was used in a recent field trial aimed at realistic simulation of the 2003... more
Access control is the process by which access to information is granted to users for certain actions based on their identity. Traditional access control models that map every system resource directly to every system user work for... more
A lot of researchers did their best to accelerate the cryptographic algorithms and develop high performance cryptographic schemes by using approaches such as the use of high end Grid computing. Grid computing is one of the most powerful... more
Mobile IPv6 provides route optimization mechanism for fast communication by lessening the overhead of indirection. Although it ameliorates the communication latency but it also needs good authentication mechanism to make route... more
Authentication is the first and most important step in provision of any secure service to the users. It is used to ensure that only authentic users be able to use that secure service.Anonymous authentication is another vital aspect in... more
Download research papers for free!