security network
Recently Published Documents


TOTAL DOCUMENTS

191
(FIVE YEARS 56)

H-INDEX

9
(FIVE YEARS 3)

Axioms ◽  
2022 ◽  
Vol 11 (1) ◽  
pp. 27
Author(s):  
Song-Kyoo (Amang) Kim

The research designs a new integrated system for the security enhancement of a decentralized network by preventing damages from attackers, particularly for the 51 percent attack. The concept of multiple layered design based on Blockchain Governance Games frameworks could handle multiple number of networks analytically. The Multi-Layered Blockchain Governance Game is an innovative analytical model to find the best strategies for executing a safety operation to protect whole multiple layered network systems from attackers. This research fully analyzes a complex network with the compact mathematical forms and theoretically tractable results for predicting the moment of a safety operation execution are fully obtained. Additionally, simulation results are demonstrated to obtain the optimal values of configuring parameters of a blockchain-based security network. The Matlab codes for the simulations are publicly available to help those whom are constructing an enhanced decentralized security network architecture through this proposed integrated theoretical framework.


2021 ◽  
Vol 31 (6) ◽  
pp. 443-449
Author(s):  
Dong-Wook Kim ◽  
Gun-Yoon Shin ◽  
Ji-Young Yun ◽  
Sung-Sam Hong ◽  
Myung-Mook Han

Author(s):  
Nabila Malik

Abstract: Software used to perform Cyber Crime are the most emerging subject in the field of Forensic Science. Today, the demand of computer and other electronic devices have increased. This creates an increase in Cyber crime and its awareness. This paper provides you vast information about methods of Cyber crime, Software used to perform cyber crime and a research study on them. In this paper you will also learn how can a software and its algorithm perform, what footprints your device left, what are the loopholes which help that software. This will help you for a better understanding of the software which were used to perform cyber crime and how can you prevent yourself from such activities. If you are a Forensic Expert than you will learn about the software tools which are used in computer forensic. I have analyzed many tools and I will share my study in this paper. After reading you will come to know how forensic science expert backup a hard drive, or how hackers steal your information.1 Keywords: Cybercrime, Hacking, Ethical hacking, Virus, Security, Cyber Security, Network Security.


2021 ◽  
Vol 12 (5-2021) ◽  
pp. 157-160
Author(s):  
Vladimir A. Putilov ◽  
◽  
Andrey V. Masloboev ◽  
Vitaliy V. Bystrov ◽  
◽  
...  

The unified methodological basis of information and analytical support of socio-economic security network-centric control in the region is proposed. The problem of regional security support is discussed at the level of risk-management of critical infrastructure resilience violation of the socio-economic systems. The methodology and tools for its implementation are aimed to information and analytical support of situational centers functioning in the region.


2021 ◽  
Vol 8 (11) ◽  
pp. 409-418
Author(s):  
Mayowa Oluro ◽  
Clement Oluwasuji

Among the various challenges that the Nigerian State has had to contend with since its inception, incessant security challenges stand out. Indeed, these challenges have continued to defy the various strategies put in place to check them by various federal security agencies in the country, including the Military, Police, Road Safety, Civil Defense, Immigration, and Custom, thereby rendering them ineffective and inefficient, and as such contributing to louder calls for restructuring of the country. State Governors in the South-West in response to the security challenges facing the region formed the Western Nigerian Security Network (WNSN) code-named Operation Amotekun, the Yoruba name for Leopard, a wild animal known for its great agility and hunting prowess. This paper seeks to examine, 1. The current federal structure vis-à-vis the various security challenges in the country, 2. The formation of the Western Nigerian Security Network (Amotekun), i.e., its prospects, likely challenges and mode of operation, and 3. Propose some policy options to aid the performance and efficiency of Amotekun and any other that may follow.


Author(s):  
De Zhou ◽  
Zhulu Lin ◽  
Tingting Yan ◽  
Jialing Qi ◽  
Wenyu Zhong

A sound ecological security network (ESN) promotes the interconnection of ecological sources, improves the pattern of ecological security, and alleviates the degradation of an ecosystem. Rapid urbanization and land use changes may lead to serious fragmentation and islanding of landscape patches and further to deep disturbance of regional ESNs. However, most studies in the recent years focused on the methodological development of ESN identification, reconstruction, and optimization, but lacked the systematic assessment of the network after its construction. The purpose of this study is to use complex network analysis to systematically assess the constructed ESN for the urban agglomeration around Hangzhou (UAHB), a rapid urbanization region in China. By integrating landscape ecology theory, graph theory, and complex network analysis, we abstracted the ESN into a topological network and developed an index system to assess the abstracted network, which was based on the structural elements of the topological network (nodes, edges, and the overall network). Our results show that the connectivity and stability of the UAHB’s ESN have been improved in the last 20 years, although isolated nodes are still existing in the ESN. Our study also shows that the network’s robustness under human disturbance has been affected more than that under non-human disturbance. Finally, we proposed five optimization strategies from the perspective of topological structure and ecological function to maintain a sustainable and well-protected ecological system.


2021 ◽  
Vol 12 (2) ◽  
pp. 613-630
Author(s):  
Sher Nawab ◽  
Sami Ullah ◽  
Usman Farooq ◽  
Muhammad Shafi Malik ◽  
Irshad Ghafoor

Background: The study was conducted in 2017 to know about the effects of militancy on education in the form of dropout from schools, destroyed infrastructure of educational institutions, decrease in literacy rate and to probe out the community perception about education in the context of adverse law and order situation in district Mohmand Agency. The study was significant because Mohmand Agency is the worst terrorist affected area. Objectives: The objectives of the study were examining the factors causing militancy, and to determine the effects of militancy on education in Mohmand Agency. Methodology: For this purpose, 250 sample respondents out of the total population from four selected villages viz Gurbaz, Masood, Sultan Khel and Baro Khel from tehsil Safi and Halimzai were selected. The respondents were randomly interviewed through an interview schedule. Chi-square test was used as statistical instrument to determine the association between education and different factors that cause terrorism. Results: It was found that majority of the respondents were agreed that unemployment, poverty, drone attacks, unidentified Pak-Afghan border were the main factors that caused militancy in the area and had greatly affected the primary and secondary education in the area. Respondents were of the view that brutal activities against Muslims across the globe and presence of NATO forces in the region increased terrorism. Involvement of foreign intelligence agencies in our county and weak national security network to handle terrorist activities properly were the main causes of terrorism. Parents remain worried about their children’s education due to security threats and insufficient schools remaining in the area. Conclusion: It was concluded that due to insecurity, lack of infrastructure and insufficient schools; education in the area under study was greatly affected. The study suggested that bringing of peace and reasonable security measures against militants can rebuild the educational environment in the study area.


2021 ◽  
Author(s):  
Naveen Kunnathuvalappil Hariharan

Many enterprises have achieved a novel, quick, and low-costtechnology to address the concerns of data storage and availabilityfor customers, which is referred to as Cloud Computing. More andmore financial service companies and organizations have shifted theiroffline services to cloud platforms to provide customers with moreconvenient and accurate services. Working with a cloud servicesprovider offers a wide variety of benefits for banks and financialinstitutions. This includes greater flexibility and scalability, lowercosts, and improved organizational efficiency. However, at themoment, they pose a certain level of data security risk to financialorganizations. For financial institutions, keeping data secure is of theutmost importance. Financial information is extremely sensitive,making it valuable and especially vulnerable. The cloud serviceproviders are making significant efforts to develop the cloud industryin order to maintain optimal security. After discussing cloudcomputing in the financial sector, this research outlined six majorsecurity concerns that financial institutions face in cloud computing.They are Information security Business securitySystem Security HostSecurity Data Security Network Security. We also discussed themajor strategies by cloud computing providers to tackle theseissues.Once the security challenges can be resolved properly, cloudcomputing will be further promoted in the finance sector. Financialinstitutions may leverage cloud computing in the future to developnovel business models and provide customers with an entirely newexperience with financial services.


2021 ◽  
Vol 4 (1) ◽  
pp. 1
Author(s):  
Marzieh Faridi Masouleh ◽  
Ahmad Bagheri

The increasing uncertainty of the natural world has motivated computer scientists to seek out the best approach to technological problems. Nature-inspired problem-solving approaches include meta-heuristic methods that are focused on evolutionary computation and swarm intelligence. One of these problems significantly impacting information is forecasting exchange index, which is a serious concern with the growth and decline of stock as there are many reports on loss of financial resources or profitability. When the exchange includes an extensive set of diverse stock, particular concepts and mechanisms for physical security, network security, encryption, and permissions should guarantee and predict its future needs. This study aimed to show it is efficient to use the group method of data handling (GMDH)-type neural networks and their application for the classification of numerical results. Such modeling serves to display the precision of GMDH-type neural networks. Following the US withdrawal from the Joint Comprehensive Plan of Action in April 2018, the behavior of the stock exchange data stream and commend algorithms has not been able to predict correctly and fit in the network satisfactorily. This paper demonstrated that Group Method Data Handling is most likely to improve inductive self-organizing approaches for addressing realistic severe problems such as the Iranian financial market crisis. A new trajectory would be used to verify the consistency of the obtained equations hence the models' validity.


Sign in / Sign up

Export Citation Format

Share Document