security systems
Recently Published Documents


TOTAL DOCUMENTS

1815
(FIVE YEARS 665)

H-INDEX

28
(FIVE YEARS 6)

Author(s):  
Arunabh Singh

Abstract: In this paper we attempt to explain and establish certain frameworks that can be assessed for implementing security systems against cyber-threats and cyber-criminals. We give a brief overview of electronic signature generation procedures which include its validation and efficiency for promoting cyber security for confidential documents and information stored in the cloud. We strictly avoid the mathematical modelling of the electronic signature generation process as it is beyond the scope of this paper, instead we take a theoretical approach to explain the procedures. We also model the threats posed by a malicious hacker seeking to induce disturbances in the functioning of a power transmission grid via the means of cyber-physical networks and systems. We use the strategy of a load redistribution attack, while clearly acknowledging that the hacker would form its decision policy on inadequate information. Our research indicate that inaccurate admittance values often cause moderately invasive cyber-attacks that still compromise the grid security, while inadequate capacity values result in comparatively less efficient attacks. In the end we propose a security framework for the security systems utilised by companies and corporations at global scale to conduct cyber-security related operations. Keywords: Electronic signature, Key pair, sequence modelling, hacker, power transmission grid, Threat response, framework.


SinkrOn ◽  
2022 ◽  
Vol 7 (1) ◽  
pp. 147-154
Author(s):  
Deuis Nur Astrida ◽  
Agung Restu Saputra ◽  
Akhmad Ikhza Assaufi

The use of computer networks in an agency aims to facilitate communication and data transfer between devices. The network that can be applied can be using wireless media or LAN cable. At SMP XYZ, most of the computers still use wireless networks. Based on the findings in the field, it was found that there was no user management problem. Therefore, an analysis and audit of the network security system is needed to ensure that the network security system at SMP XYZ is safe and running well. In conducting this analysis, a tool is needed which will be used as a benchmark to determine the security of the wireless network. The tools used are Penetration Testing Execution Standard (PTES) which is one of the tools to become a standard in analyzing or auditing network security systems in a company in this case, namely analyzing and auditing wireless network security systems. After conducting an analysis based on these tools, there are still many security holes in the XYZ wireless SMP that allow outsiders to illegally access and obtain vulnerabilities in terms of WPA2 cracking, DoS, wireless router password cracking, and access point isolation so that it can be said that network security at SMP XYZ is still not safe


Sensors ◽  
2022 ◽  
Vol 22 (1) ◽  
pp. 348
Author(s):  
Francisco de Melo ◽  
Horácio C. Neto ◽  
Hugo Plácido da Silva

Biometric identification systems are a fundamental building block of modern security. However, conventional biometric methods cannot easily cope with their intrinsic security liabilities, as they can be affected by environmental factors, can be easily “fooled” by artificial replicas, among other caveats. This has lead researchers to explore other modalities, in particular based on physiological signals. Electrocardiography (ECG) has seen a growing interest, and many ECG-enabled security identification devices have been proposed in recent years, as electrocardiography signals are, in particular, a very appealing solution for today’s demanding security systems—mainly due to the intrinsic aliveness detection advantages. These Electrocardiography (ECG)-enabled devices often need to meet small size, low throughput, and power constraints (e.g., battery-powered), thus needing to be both resource and energy-efficient. However, to date little attention has been given to the computational performance, in particular targeting the deployment with edge processing in limited resource devices. As such, this work proposes an implementation of an Artificial Intelligence (AI)-enabled ECG-based identification embedded system, composed of a RISC-V based System-on-a-Chip (SoC). A Binary Convolutional Neural Network (BCNN) was implemented in our SoC’s hardware accelerator that, when compared to a software implementation of a conventional, non-binarized, Convolutional Neural Network (CNN) version of our network, achieves a 176,270× speedup, arguably outperforming all the current state-of-the-art CNN-based ECG identification methods.


2022 ◽  
Author(s):  
Inqilab Shahbazov ◽  
Zaur Afandiyev

Using the dataset of the first nationwide victimization survey in Azerbaijan, the current paper analyzed whether home security systems have a relationship with the perceived probability of property crime victimization. The ordinal logistic regression analysis was employed. The first set of results examining the distribution of security systems identified that despite the impact of certain demographics correlates, perceived risk is not a significant correlate of possession or absence of security systems. The presence of security measures at home was associated with a higher perceived probability of victimization level for acquisitive crimes. This study shows the importance of incorporating home security level as an independent variable. The choice of home as a unit of analysis when studying fear of victimization allowed us to ascertain not only the impact of home security systems on perceived victimization risks, but also to find out whether it is dwelling, demographic or neighborhood features that matter more in affecting sense of safety. The key findings of the study are that a) the level of home security systems is positively correlated with PPV, irrespective of individual-level characteristics, and b) perceived risk is not a statistically significant factor when it comes to a decision to purchase security systems.


YMER Digital ◽  
2022 ◽  
Vol 21 (01) ◽  
pp. 1-15
Author(s):  
Aannd R ◽  
◽  
Anil G N ◽  
Rishika Sankaran ◽  
Anushruti Adhikari ◽  
...  

Object detection has received a lot of research attention in recent years because of its tight association with video analysis and picture interpretation. Face detection, vehicle detection, pedestrian counting, web photos, security systems, and self-driving automobiles are all examples of object detection. With little conscious thought, the human visual system can accomplish complicated tasks such as distinguishing multiple objects and detecting impediments. Thanks to the availability of large amounts of data, faster GPUs, and improved algorithms, we can now quickly train computers to detect and classify many elements inside a picture with high accuracy. Our project is focused on building a single-access platform for various object detection tasks. A user-interface where the user is asked for the relevant inputs and an output based on this is generated automatically by the system. Also, accuracy and precision measures are also displayed so that the user is wary of their liability extent on the generated results.


2022 ◽  
Vol 8 (2) ◽  
pp. 339-346
Author(s):  
Edi Saputra Siregar

Storage for goods is an important part of a mosque. When we are going to pray in congregation, the items or bags we carry make us anxious and afraid of losing. The development of technology has replaced the storage of goods carried out by mosque officials into an automated storage system. But it also needs to be considered in terms of the security system for storing these items. Researchers formulate how automation and security systems use RRFID. The research method used is research and development. The storage of this item is programmed with the Arduino and CX Programmer applications by creating a security system using Radio Frequency Identification (RFID) as radio waves carrying data that will be received by the RFID reader. The result of this research is an automatic door prototype using RFID which will operate properly. Reader ability to detect id card very good starting when the card is affixed to the reader and the selenoid system will work to open the door when the id card is attached.


Daedalus ◽  
2022 ◽  
Vol 151 (1) ◽  
pp. 170-180
Author(s):  
Jonathan Simon

Abstract Human dignity as a value to guide criminal justice reform emerged strikingly in the 2011 Supreme Court decision in Brown v. Plata. But with Justice Kennedy retired and courts generally reluctant to go far down the road to practical reforms, its future lies in the political realm shaping policy at the local, state, and national levels. For human dignity to be effective politically and in forming policy, we need a vocabulary robust enough to convey a positive vision for the penal state. In this essay, I discuss three concepts that can provide more precision to the potential abstractness of human dignity, two of which the Supreme Court has regularly used in decisions regarding punishment: the idea of a “decent society,” the idea of a “civilized system of justice,” and the idea of a “condition of dignity.” In brief, without a much broader commitment to restoring a decent society, and to civilizing our justice and security systems, there is little hope that our police stations, courts, jails, and prisons will provide a condition of dignity to those unfortunate enough to end up in them.


2022 ◽  
pp. 695-710
Author(s):  
Mahmoud Mohammad Al-Ajlouni

Security systems are often the target of cyber-criminals and professional hackers, but often they fail in hiding all traces of the attack, thereby leaving critical evidence that could lead to identifying and arresting the criminal. However, hacking skills vary from one hacker to another depending on the hacker's personal traits, behavior, and intellectual tendencies. The aim of this study is to develop a proposed descriptive model of the behavioral patterns and motives of hackers based on programmable psychological theories, modeled using object-oriented programming models. The study proposes a descriptive model of an inverse algorithm that simulates Holland's Theory of Behavioral Patterns. Findings show that this descriptive model is applicable to be produced as a code map for the human resources of an investigative nature.


2022 ◽  
Vol 2161 (1) ◽  
pp. 012046
Author(s):  
R Pradeep ◽  
N R Sunitha

Abstract A smart city is a technologically advanced metropolitan region with several connected devices that collects data using various electronic technologies, voice activation methods, and sensors. The information obtained from the data is utilised to efficiently manage assets, resources, and services; in turn, the data is used to enhance operations throughout the city. Achieving security for smart cities is one of the major challenges as the number of connected devices increases the vulnerability also increases. The security of a smart city system depends on the reliability of the security protocols used by the security systems. To design and develop a highly secure system for a smart city the security protocols used must be highly reliable. To prove the reliability of a security protocol the validation technique is not desirable because of its several drawbacks, these drawbacks can be overcome using the formal verification technique which provides the mathematical proof for its correctness. In this work, The Challenge-Handshake Authentication Protocol Point-to-Point (CHAP PPP) which is more commonly used in PPP authentication of smart cities is formally verified using the well-known verification technique known as the model checking technique. The Scyther model checker is the tool used to build the abstract security protocol model.


Author(s):  
Jing Liu ◽  
Ziang Chen ◽  
Jia Hu ◽  
Hongxia Sun ◽  
Yan Liu ◽  
...  

Organic solid-state materials with p-RTP (persistent room-temperature phosphorescence) properties have been made infusive achievements. However, researches on metal-organic hybrids with p-RTP are limited, in which dual phosphorescent ones are relatively...


Sign in / Sign up

Export Citation Format

Share Document