security evaluation
Recently Published Documents


TOTAL DOCUMENTS

1068
(FIVE YEARS 272)

H-INDEX

25
(FIVE YEARS 5)

Author(s):  
Zsombor Petho ◽  
Intiyaz Khan ◽  
Árpád Torok

AbstractThis article investigates cybersecurity issues related to in-vehicle communication networks. In-vehicle communication network security is evaluated based on the protection characteristics of the network components and the topology of the network. The automotive communication network topologies are represented as undirected weighted graphs, and their vulnerability is estimated based on the specific characteristics of the generated graph. Thirteen different vehicle models have been investigated to compare the vulnerability levels of the in-vehicle network using the Dijkstra's shortest route algorithm. An important advantage of the proposed method is that it is in accordance with the most relevant security evaluation models. On the other hand, the newly introduced approach considers the Secure-by-Design concept principles.


Water ◽  
2022 ◽  
Vol 14 (1) ◽  
pp. 106
Author(s):  
Bin Wang ◽  
Fang Yu ◽  
Yanguo Teng ◽  
Guozhi Cao ◽  
Dan Zhao ◽  
...  

The DPSIR model is a conceptual model established by the European Environment Agency to solve environmental problems. It provides an overall framework for analysis of environmental problems from five aspects: driving force (D), pressure (P), state (S), impact (I), and response (R). Through use of the DPSIR model framework, this paper presents the SEEC model approach for evaluating watershed ecological security. The SEEC model considers four aspects: socioeconomic impact (S), ecological health (E), ecosystem services function (E), and control management (C). Through screening, 38 evaluation indicators of the SEEC model were determined. The evaluation results showed that the ecological security index of the study area was >80, indicating a generally safe level. The lowest score was mainly attributable to the low rate of treatment of rural domestic sewage. The water quality status was used to evaluate the applicability of the SEEC model, and the calculation results indicated that the higher the score of the ecological security evaluation results, the better the water quality status. The findings show that the SEEC model demonstrates satisfactory applicability to evaluation of watershed ecological security.


2022 ◽  
Vol 70 (1) ◽  
pp. 1127-1140
Author(s):  
Nadia Tabassum ◽  
Tahir Alyas ◽  
Muhammad Hamid ◽  
Muhammad Saleem ◽  
Saadia Malik ◽  
...  

2022 ◽  
Vol 19 (3) ◽  
pp. 2896-2912
Author(s):  
Jiang Zhao ◽  
◽  
Dan Wu ◽  
◽  

<abstract> <p>The industrial internet depends on the development of cloud computing, artificial intelligence, and big data analysis. Intelligent fusion is dependent on the architecture and security features of the industrial internet. Firstly, the paper studies the infrastructure mode that needs to be solved urgently in the industrial internet and provides a possible infrastructure mode and related security evaluation system. Secondly, it analyses the digital transformation process with the case of G.E.os industrial nternet development practice. It clarifies that G.E. is forming a new value closed-loop through digital and strategy mixed channels. Thirdly, industrial internet security research is described within multiple viewpoints based on industrial internet applications, the security service and security assurance defense systemos architecture, and the non-user entrance probability model. Finally, the paper illustrates the changes in knowledge workflow and social collaboration caused by the industrial internet under intelligent manufacture.</p> </abstract>


2021 ◽  
pp. 75-91
Author(s):  
Yurii Chentukov ◽  
Tetyana Marena ◽  
Olha Zakharova

The study is aimed at analyzing methods of country’s debt security evaluation, developing methodic approach towards estimating the level of debt security based on the calculation of the integral index, and assessing the level of debt security of CEE countries on the basis of the proposed approach. A method of calculating the integral debt security index of the country is developed, taking into account generally accepted thresholds of indebtedness and solvency indicators and the trend of countries’ increasing dependence on external borrowing. The proposed approach is practically tested in assessing the level of debt security of CEE countries. It is determined that the group of CEE countries is differentiated by the state of indebtedness and solvency. The highest level of debt security is demonstrated by Bulgaria, the Czech Republic and Estonia, the worst situation with the debt security is formed in Slovakia and Slovenia. Based on the analysis of the dynamics of integral debt security indices for 2007–2019, the grouping of CEE countries by the level and zones of debt security, the trends of deterioration of the region’s debt security in 2010–2015 and its improvement in 2016–2019 has been found out. The proposed approach is universal one; it can be used to calculate debt security indices and to provide comparative studies of the debt sector of any country or region. It can also help to identify weaknesses in country’s debt security that is critically important for reasoning the public policy measures to ensure a proper level of debt security.


Sensors ◽  
2021 ◽  
Vol 22 (1) ◽  
pp. 44
Author(s):  
Leiting Tao ◽  
Xiaofeng Wang ◽  
Yuan Liu ◽  
Jie Wu

Cyber-physical systems (CPSs) based on space-ground integrated networks (SGINs) enable CPSs to break through geographical restrictions in space. Therefore, providing a test platform is necessary for new technical verification and network security strategy evaluations of SGINs. User behavior emulation technology can effectively support the construction of a test platform. Given the inherent dynamic changes, diverse behaviors, and large-scale characteristics of SGIN users, we propose user behavior emulation technology based on a cloud platform. First, the dynamic emulation architecture for user behavior for SGINs is designed. Then, normal user behavior emulation strategy driven by the group user behavior model in real time is proposed, which can improve the fidelity of emulation. Moreover, rogue user behavior emulation technology is adopted, based on traffic replay, to perform the security evaluation. Specifically, virtual Internet Protocol (IP) technology and the epoll model are effectively integrated in this investigation to resolve the contradiction between large-scale emulation and computational overhead. The experimental results demonstrate that the strategy meets the requirement of a diverse and high-fidelity dynamic user behavior emulation and reaches the emulation scale of 100,000-level concurrent communication for normal users and 100,000-level concurrent attacks for rogue users.


Author(s):  
Larysa Dokiienko ◽  
Nataliya Hrynyuk ◽  
Olena Nakonechna ◽  
Olga Mykhailyk

Purpose. The purpose of the article is to develop a system for evaluation the state of financial security of operating activities of enterprises in oil-and-fat industry based on the coordination of the interaction of the main factors of influence and levels of its components. Methodology / approach. In the process of writing the article the following research methods were used: abstract-logical (at the systematization of scientific publications on the problems of management of enterprises in oil-and-fat industry, financial security of enterprises), grouping (by clustering enterprises depending on the obtained results), comparisons (by developing a model for assessing the degree of financial stability of operating activities of enterprises), coefficient (by developing a model for assessing the degree of liquidity of enterprises), formalization (by developing a matrix for diagnostics of the state of financial security of operating activities of enterprises), generalization (by formulating research conclusions). Results. In the process of research, the system of complex evaluation of degrees and levels of the main components of financial security of the operations activities of the enterprises in oil-and-fat industry was substantiated: a model for assessing the financial stability of operating activities and a model for assessing the liquidity of an enterprise. A diagnostic matrix for the financial security status of the operational activities of the enterprises in oil-and-fat industry was developed to define the security boundaries of the operation activity of enterprises. Approbation of the proposed system for assessing the financial security of operating activities on the materials of the selected group of enterprises in the oil-and-fat industry made it possible to analyze the dynamics of the state of the financial security of their operating activities. Originality / scientific novelty of the research is to develop tools for a comprehensive evaluation of the financial security of the operating activities of the enterprises in oil-and-fat industry. The method of determining the impact of the degree of financial stability and liquidity of the enterprise on the level of financial security of current activities was improved. For the first time, a nine-quadrant matrix of the state of financial security of operating activities of enterprises depending on the ratio of the degrees of the above factors was substantiated. Practical value / implications. The use of the proposed system of financial security evaluation of operating activities of the enterprise, according to the authors, can serve as an effective mechanism for managing the financing current activities of enterprises in oil-and-fat industry and become an informative tool for factor analysis in managing their overall financial security.


2021 ◽  
Vol 132 ◽  
pp. 108295
Author(s):  
Youyan Liu ◽  
Chuanyan Zhao ◽  
Xingming Liu ◽  
Yapeng Chang ◽  
Hong Wang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document