Science topic

Security - Science topic

Security is the degree of protection against danger, damage, loss, and crime. Security as a form of protection are structures and processes that provide or improve security as a condition.
Questions related to Security
  • asked a question related to Security
Question
1 answer
What is the background story of calculating the value of d in the RSA algorithm of Cryptography and Network Security?
The value of d is required for decryption. I want to know the derivation of finding d. The equation of finding d is d = e-1mod Φ(n).
Consider an example: P = 17, q = 7, n = 119, φ (n) = 96, e = 5. From here I want to find the value of d in my hand. How can I do this?
Relevant answer
  • asked a question related to Security
Question
7 answers
What libraries are suitable for pre-printing the article?
Relevant answer
Dear honorable researchers,
Preprints are defined as an author’s version of a research manuscript prior to formal peer review at a journal, which is deposited on a public server. ResearchGate (RG) said about "Preprints" an early-stage research.
Before answering this valuable question of Prof. Yashar Salami, please let me give my own opinion about preprint:
  • Why you let others know about your insights and methodologies before publication? You should avoid telling the other researchers about the details of anyone of your papers until it has been published and seeing your name by yourself. You may say that I am somewhat old-fashioned, but I have a different perspective for uploading any preprint anywhere before it has been published by your name. So, my advice is not to put your research anywhere until it is published.
  • Your manuscript may be copied and then published by others before you can do that. This stealing of your paper might be happening. So, you must wait until the paper is accepted and then published by that journal. Then, upload that research item on any platform you wish.
  • A journal may have automated plagiarism software to check the paper before admitting it to the reviewing process. There are chances that your paper can get a rejection at any point. Thus, to avoid this problem. Publish the preprint after you got the paper as "ACCEPTED".
Finally, for the coming future, do not upload any paper anywhere until it is published with your name. Even if it is a "preprint"! For the time being, If you had done something like that as a "preprint", for instance, I advise you to delete the preprint from any elsewhere and wait for two months before sending the paper to any journal.
  • asked a question related to Security
Question
7 answers
Do you think pre-printing an article in scientific research is the right thing to do?
Relevant answer
Dear honorable researchers,
Preprints are defined as an author’s version of a research manuscript prior to formal peer review at a journal, which is deposited on a public server. ResearchGate (RG) said about "Preprints" an early-stage research.
Before answering this valuable question of Prof. Yashar Salami, please let me give my own opinion about preprint:
Why you let others know about your insights and methodologies before publication? You should avoid telling the other researchers about the details of anyone of your papers until it has been published and seeing your name by yourself. You may say that I am somewhat old-fashioned, but I have a different perspective for uploading any preprint anywhere before it has been published by your name. My advice is not to put your research anywhere until it is published.
  • Your manuscript may be copied and then published by others before you can do that. This stealing of your paper might be happening. So, you must wait until the paper is accepted and then published by that journal. Then, upload that research item on any platform you wish.
  • A journal may have automated plagiarism software to check the paper before admitting it to the reviewing process. There are chances that your paper can get a rejection at any point. Thus, to avoid this problem. Publish the preprint after you got the paper as "ACCEPTED".
Finally, for the coming future, do not upload any paper anywhere until it is published with your name. Even if it is a "preprint"! For the time being, If you had done something like that as a "preprint", for instance, I advise you to delete the preprint from any elsewhere and wait for two months before sending the paper to any journal.
  • asked a question related to Security
Question
5 answers
How can citizens prepare for a future projected energy crisis?
How can we protect ourselves against a future energy crisis?
How should the state transform the energy sector to make the economy more resilient to possible future energy crises?
How should the state ensure energy security for its citizens?
How should the economy be prepared for the projected increase in energy commodity prices and energy price increases?
What is your opinion on this topic?
Please reply,
I invite you all to discuss,
Thank you very much,
Best regards,
Dariusz
Relevant answer
Answer
We have now had over 30 years of doom-mongering about so-called AGW and yet the effects cannot be measured against the natural rebound from the LIA (that destroyed many countries for centuries). Far more important is to develop strategies to mitigate any effects of climate change, e.g. sea-walls and reflective houses. The population of the world will not develop on unreliable power sources.
Ultimately, fusion must be the goal, but that remains decades away.
  • asked a question related to Security
Question
3 answers
From a security perspective whether the attack model and the threat model are the same or different?
Relevant answer
Answer
Dear Sanjay Kumar,
You may want to review info presented below:
Attack Modeling vs Threat Modeling:
_____
Threat Model vs Attack Model:
_____
IT Security Vulnerability vs Threat vs Risk: What are the Differences?
_____
  • asked a question related to Security
Question
3 answers
Why self driving car using Artificial Intelligence.What make them essential overcome on complexity, localization, security challenges by AI? How algorithm is useful to resolve such challenges?
Relevant answer
Answer
The AI simulates human perceptual and decision-making processes using deep learning and controls actions in driver control systems, such as steering and brakes. The car's software consults Google Maps for advance notice of things like landmarks, traffic signs and lights.
Regards,
Shafagat
  • asked a question related to Security
Question
1 answer
I am using a Carbo-H 4x3.0mm security guard cartridge in my pre column of my HPLC. Are there compatible cleaning solutions I can run through the cartridge to extend usage?
Relevant answer
Answer
7/28/22
Dear Mallory,
Personally, my options, in the order of preference, would be:
1. Purchase a new guard column and replace the old one. Guard columns are not that expensive.
2. Turn the guard column end-for-end and pump mobile phase through it for several hours (overnight is OK) at a flow rate and pressure compatible with the cartridge. (If you let the eluent go to waste, the pressure will not be a problem.)
3. I'm not familiar with this cartridge, so I don't know what solvent us suitable for cleaning. Suggest you contact Phenomenex and ask someone in Tech Support about this. They should be able to suggest one or more appropriate cleaning solvents.
I hope this information helps you.
Bill Colonna Iowa State University, Ames, IA wcolonna@iastate.edu
  • asked a question related to Security
Question
3 answers
Consider torrents is used to share packets to user in demand. How can we safeguard this process without involving unnecessary monitoring by ISP's?
Relevant answer
Answer
Dear Abishek Karthik,
Hope the data following below may be helpful
Internet Security Protocols
To provide the security to this internet various protocols have been used like SSL (Secure Socket Layer), TLS (Transport Layer Security), etc. Various Internet Security Protocols. Given below are the various protocols: Start Your Free Software Development Course. Web development, programming languages, Software testing & others. 1. SSL Protocol. SSL Protocol stands for Secure Socket Layer protocol, which is an internet security protocol used for exchanging the information between a web browser and a web server in a secure manner. It provides two basic security services like authentication and confidentiality. ... Encryption and digital signature format used in SHTTP have the origins in the PEM (Privacy Enhanced Mail) protocol.
_____
In computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks (VPNs).
IPsec includes protocols for establishing mutual authentication between agents at the beginning of a session and negotiation of cryptographic keys to use during the session. IPsec can protect data flows between a pair of hosts (host-to-host), between a pair of security gateways (network-to-network), or between a security gateway and a host (network-to-host).[1] IPsec uses cryptographic security services to protect communications over Internet Protocol (IP) networks. It supports network-level peer authentication, data origin authentication, data integrity, data confidentiality (encryption), and replay protection (protection from replay attacks).
The initial IPv4 suite was developed with few security provisions. As a part of the IPv4 enhancement, IPsec is a layer 3 OSI model or internet layer end-to-end security scheme. In contrast, while some other Internet security systems in widespread use operate above the network layer, such as Transport Layer Security (TLS) that operates above the transport layer and Secure Shell (SSH) that operates at the application layer, IPsec can automatically secure applications at the internet layer.
_____
  • asked a question related to Security
Question
3 answers
I am looking for advancement in research in terms of security in Android.
Relevant answer
Answer
Dear Muhammad Daniyal Mehmood,
You may want to look over the following data:
_____
https:///www.esecurityplanet.com/trends/android-security-risks/
_____
Vulnerabilities and threats in mobile applications, 2019
_____
Which Android phones get regular security updates? Here's a hint
A rare clue about the big picture of security update performance across the Android ecosystem.
_____
Computers at Risk: Safe Computing in the Information Age
National Academies of Sciences, Engineering, and Medicine. 1991. Computers at Risk: Safe Computing in the Information Age. Washington, DC: The National Academies Press. https://doi.org/10.17226/1581.
_____
  • asked a question related to Security
Question
8 answers
I need a security dataset with challenges, I mean I want the accuracy to be low so that I can enhance it using ML techniques. I tried several datasets but they already have high accuracy without enhancement.
Relevant answer
Answer
Mohamed Amine Ferrag, Othmane Friha, Djallel Hamouda, Leandros Maglaras, Helge Janicke, "Edge-IIoTset: A New Comprehensive Realistic Cyber Security Dataset of IoT and IIoT Applications for Centralized and Federated Learning", IEEE Access, April 2022, DOI: 10.1109/ACCESS.2022.3165809
  • asked a question related to Security
Question
1 answer
Equine use, characterization,storage, application security.
Relevant answer
Answer
Dear Camilo osorio florez,
Presented data below may be useful:
Ozone and its derivatives in Veterinary Medicine: a careful appraisal:
The therapeutic use of ozone and its derivatives in the veterinary medicine it is still in an emergent stage. Gaseous ozone chemical instability... | Find, read and cite all the research you need on ResearchGate. ... groups: treated with 50 mL intrauterine ozonized distilled sterile solution 35 days after calving; and non-treated cows as control. Endometrial. ... biochemical results derived from arterial and venous blood samples in post-. anesthetic dogs. Animals, 10 , 2080. https://doi.org/10.3390/ani10112069 .
_____
During blood ozonation ex vivo for the minor AHT, using ozone concentrations threefold to fourfold higher than the maximal concentration (about 300 mcg/ml per ml of blood), it may be feasible to induce the oxidation of free viral components, which could represent a sort inactivated and immunogenic vaccine (Bocci et al., 2009b). ... It also helps to gargle the ozonized water at the same time. ... Two papers by a Polish group have shown, in comparison to an oxygen-control group, the clinical efficacy of ozonated AHT in hemodialyzed patients with intermittent claudication, without any side effects (Tylicki et al., 2001, 2003, 2004a, b; Biedunkiewicz et al., 2004; Di Paolo et al., 2005).
OZONE pp 97–232Cite as
The Clinical Application of Ozonetherapy
_____
‘Blood derivatives’ are obtained through industrial fractionation procedures from raw plasma.
From: International Encyclopedia of Public Health (Second Edition), 2017
Medical Biotechnology and Healthcare
Advances in diagnostic microfluidics
_____
  • asked a question related to Security
Question
6 answers
Can we simulate an IoT kind of network using the NetSim 5G library? I would also want to model different kinds of attacks and generate data set to train an ML classifier.
  • asked a question related to Security
Question
1 answer
Quantum world appears mysterious as of now. Quantum Communications is likely to open newer dimensions in Telecommunications. Quantum key description (QKD) brings in security of by its ability to detect any attempt of intrusion/hacking. What are the Quantum Communications Technologies which may gain popularity at par with QKD ?
  • asked a question related to Security
Question
5 answers
Can someone guide me a little? I am working on my Thesis related to IoT Security. Can you specify some major/challenging topics related to the Network Security of IoT Devices using Artificial Neural Networks? Any Precise topic/area in this field pls? Your response in this regard will be highly helpful for me. Thank you
Relevant answer
Answer
IoT zero-day attack detection and prevention
  • asked a question related to Security
Question
3 answers
Good day Dear Researchers. Please I would want to ask a question on cryptography. Am trying to use hybrid cryptography to secure a system, that is 3DES AND AES. Is it possible to merge both algorithms to have a unique algorithm. Or we encrypt the plaintext using the first algorithm (3DES) then the output is encrypted again using the next algorithm (AES). PLEASE, WHICH IS BETTER AND WHY?? AND WHICH IS POSSIBLE AND WHY??
Relevant answer
Answer
Dear Chibueze Nwamouh Ubochi,
Find below several professional opinions to your question:
Integrating AES, DES, and 3-DES Encryption Algorithms for Enhanced Data Security
_____
Why would anyone choose 3DES over AES in software?
_____
Combination of more than one crypto algorithm
  • asked a question related to Security
Question
6 answers
Are researchers with online PHDs less likely to secure faculty positions in universities, especially in the developed world?
Relevant answer
Answer
Hi Oluwasegun Akinyemi , thank you for the good question to follow.
In my opinion, it depends on an individual's performance. I have no struggle if the online doctorates could do the work and papers that significantly impact academics—the exact reason is also for traditional doctorates. However, I agree with professors that the countries could be the factors in decisions in securing faculty positions in universities.
  • asked a question related to Security
Question
3 answers
The AES Encryption algorithm (also known as the Rijndael algorithm) is a symmetric block cipher algorithm with a block/chunk size of 128 bits. It converts these individual blocks using keys of 128, 192, and 256 bits. Once it encrypts these blocks, it joins them together to form the ciphertext.
It is based on a substitution-permutation network, also known as an SP network. It consists of a series of linked operations, including replacing inputs with specific outputs (substitutions) and others involving bit shuffling (permutations).
In this tutorial, you will go through some of the standout features that AES offers as a globally standardized encryption algorithm.
  • asked a question related to Security
Question
1 answer
Greetings all,
I am a Phd student starting on my thesis journey to hopefully do good to the libraries, furthermore, lets say the main theme focus suggested by the ministy of higher education is the corporate governance and IPO instead of internal financing. and since I am highly interested in Blockchain I believe such techonology would serve corporate governance in wide range of ways, since it shares same characteristics with it (Transparency, cryptography, security etc), My question is what problem can we solve on the IPO in particular? can we assume blockchain adoption is same as corporate governance ? what variables can we use? the preferable study case (empirical ? ) I would be happy to find some insights since it is broad new topic and we need to shed lights on. thanks in advance
Relevant answer
Answer
Dear Faycal Benhalima,
Blockchain technology, like many other Industry 4.0 technologies, can improve the issue of corporate governance in various aspects, including external financing of business entities through IPO. The only key issue is in what specific applications a specific new technology is used. If the Blockchain technology is used to improve and increase the security of electronic, including Internet data transfer, to increase the security of internal, intranet IT systems, to increase the effectiveness of integrated IT systems supporting business management, then the positive effects of this type of application will most likely appear. So, in my opinion, the improvement in the efficiency of companies, enterprises and institutions resulting from the implementation of new technologies, including Blockchain technology, depends mainly on the specific applications for which the new technology will be used.
Best wishes,
Dariusz
  • asked a question related to Security
Question
5 answers
Quantum communications technologies (like Quantum Key distribution) are often viewed as panacea of all ills required to make data transmission in telecom network secure. The question is - Can QKD help secure the ICT systems from computer viruses and worms?
Relevant answer
Answer
Dear Brajesh Mishra,
Here below is some auxiliary info:
, CTO at Serissa Research (2001-present) Lawrence Stewart
Answered Jul 11, 2019
AES with 256-bit keys is pretty good.
See Is AES-256 a post-quantum secure cipher or not?
Attacks are always improving, so there is nothing you can do that will be secure indefinitely. Also, you have to keep the key somewhere, so all encryption does is substitute keeping a small thing secret in exchange for keeping a larger thing secret. If you can keep a key secure somewhere, just put your data there too. Storage devices are pretty small.
If you have nowhere to keep your crypto keys, then no algorithm is going to help.
  • asked a question related to Security
Question
4 answers
Can you guys recommend me a book about how to create a perfect, secure database? or any resources that i can learn from?, I need some information about relational databases and security in dbs ?
Relevant answer
Answer
Atzeni, De Antonelli: Relational Database Theory
  • asked a question related to Security
Question
19 answers
What is relation between organically grown vegetables and nutritional security ?
Relevant answer
Answer
Arbind K. Choudhary, again thank you very much for your valuable support and blessings.
With regards
  • asked a question related to Security
Question
2 answers
Kindly visit the article, and share your honest thoughts in any communication style, even if you are not an expert. Feel free to submit your thoughts here, or under the comments section of the article.
Looking forward to hear your thoughts. Let the fun debates begin!
Best,
M. R.
Relevant answer
Answer
hi,
In cryptography, a key derivation function (KDF) is a cryptographic algorithm that derives one or more secret keys from a secret value such as a main key, a password, or a passphrase using a pseudorandom function (which typically uses a cryptographic hash function or block cipher).Ġasaq; a provably secure key derivation method that, when given access to a true random number generator (TRNG), allows communicating parties, that have a pre-shared secret password p, to agree on a secret key k that is indistinguishable from truly random numbers with a guaranteed entropy.The derivation key index is used to locate the derivation key (i.e. the master DES key) for the issuer BIN, as derived by the online switch in case of EMV cards. .
for more info:
best wishes..
  • asked a question related to Security
Question
5 answers
The main features of smart homes/buildings include real-time monitoring, remote control, safety from intruders, gas/fire alarm, and so on. Because sensitive and private information is managed within smart homes/buildings, security and privacy solutions must be put in place in order to protect users/businesses' data against violation attempts as well as to guarantee the provision of reliable services. To this end, rules—in the form of policies—associated with the smart home/building resources must be defined and correctly enforced by means of a robust framework for handling the huge amount of IoT data managed.
Source: Sicari, S., Rizzardi, A., Miorandi, D. and Coen-Porisini, A. Securing the smart home: A real case study, Internet Technology Letters, 2018; 1:e22. https://doi.org/10.1002/itl2.22
N. Panwar, S. Sharma, G. Wang, S. Mehrotra, and N. Venkatasubramanian, “Verifiable round-robin scheme for smart homes,” in Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, CODASPY ’19, pp. 49–60, 2019.
Relevant answer
Answer
This work has presented an intelligent home automation system based on IoT technologies, cloud computing, and a machine learning algorithm. The home automation system allows remote and local control of the home via an Android-based mobile application. The system controls electrical home appliances, monitors environmental conditions through temperature, humidity, and light sensors, and ensures home security through a motion sensor and an IoT camera. The system makes intelligent decisions to automatically turn ON or OFF lights and allow the user to view a picture of the person captured by the camera and decide whether to save it. The system is scalable, and the application allows additional appliances with an extra configured point, simply named outlet in our work. Also, the mobile application uses a real-time cloud database to record data gathered. It also displays the trend of the readings graphically on the screen of the mobile application. These data can be analyzed and used for future prediction. The next phase of the work will be to use a dataset of several real-life images captured by the camera from the system or sourced from relevant datasets in the field of home automation and train a machine learning algorithm to classify them so that the system could differentiate between an intruder and the home occupants. Also, we plan to enhance the system such that the user will only receive captured images of an intruder, and other captured images will be saved in real-time into the cloud-based database of the system. This will remove the limitation on the encumbrance of a load of images on the mobile application. In addition, machine learning will also be used to enhance the PIR sensor’s performance to differentiate between an animal, the occupant, and an intruder. This will reduce the notification from the PIR sensor to the user. The machine learning algorithm will also be applied to classify detected images to work with several occupants and a larger data set of intruders.
  • asked a question related to Security
Question
3 answers
My inclination is to choose "No Security" within Document Properties of a PDF I'm ready to post, or are there good reasons to have security?
Relevant answer
Answer
There are many reasons why you might want or need to add security measures to a PDF, among which there are essentially two main reasons to lock a PDF: to control who can access the document, or to control who can alter the document.
  • asked a question related to Security
Question
5 answers
Any alternative methods against informal theoretical security analysis.
Relevant answer
Answer
Dear Muralidhar Patruni,
You may want to review the following info:
_____
Abstract In this document we give guidelines for writing Internet Drafts in order to facilitate their security analysis. By "security analysis" we mean, not only informal analyses, but formal analyses using automated tools, and mathematical analysis of the cryptographic protocols used in an Internet Draft.
_____
  • asked a question related to Security
Question
6 answers
Greetings and Regards
What is the best blockchain for IoT data in medicine? Which blockchain is more appropriate and efficient for IoT data in health? In terms of scalability, cost, security, ... . Previously, this data was implemented with Tangel. Which blockchain is better than Tangel?
Which blockchain is more suitable for medical images and videos?
Thanks in advance.
Relevant answer
Answer
Hi Masume Jafari, It varies depending on the purpose Blockchain (BC) is being used for the medicine data.
Please note that one single tool may not fulfill all the purposes we strive to do a test with. For example, one certainly needs High-Performance Computing (HPC) to test consensus (mining) algorithms, i.e., PoW, PoS, etc. However, if anyone is willing to set up a small BC network, BlockSim should be helping him out. Similarly, Caliper presents performance results, such as latency, scalability or delay overhead etc. Hope this helps. Zia, RMIT University, Melbourne, Australia.
  • asked a question related to Security
Question
9 answers
Hello All,
RIS/IRS are a currently widely discussed topic. Does anyone here also work on security with regard to RIS/IRS?
I would be glad if we could discuss our ideas in this regard.
Thank you and best wishes,
Christoph
Relevant answer
Answer
Dear all:
If you have a paper on RIS, I am running a special session on "Reconfigurable Intelligent Surfaces" at this year's European Wireless (https://ew2022.european-wireless.org/call-for-papers/). Take a look at the CFP and consider submitting to the Special Session.
  • asked a question related to Security
Question
7 answers
Hi
What are the security topics the need to be researched in NFV ?
Which author should I be following for such research ?
I am also looking at comparing security in middleboxes vs NFV.
thanks
Relevant answer
Answer
By shifting the way of implementing hardware middleboxes (e.g., frewalls, WAN optimizers and load balancers) to software-based virtual network function (VNF) instances, network function virtualization (NFV) emerges as a promising paradigm that embraces great flexibility, agility and efficiency.
Recommend follow John C.s. Lui
  • asked a question related to Security
Question
3 answers
There has been tremendous growth in the number of smart devices and their applications (e.g., smart sensors, wearable devices, smartphones, smart cars, etc.) in use in our everyday lives. This is accompanied by a new form of interconnection between the physical and digital worlds, commonly known as the Internet of Things (IoT). This is a paradigm shift, where anything and everything can be interconnected via a communication medium. In such systems, security is a prime concern, and protecting the resources (e.g., applications and services) from unauthorized access needs appropriately designed security and privacy solutions. Building secure systems for the IoT can only be achieved through a thorough understanding of the particular needs of such systems.
  • asked a question related to Security
Question
5 answers
I am currently doing my research in SDN security. I am just wondering what are the research trends now a days in the security issues in SDN.
  • asked a question related to Security
Question
3 answers
Hello All,
I am currently investigating different standards related to IoT security. I am interested in EU-related or any International standards applicable to Security aspects of IoT devices. I came across a few standards and regulations like IEC 62443, ENISA, ETSI. But I would like to know more if there are any and also any published paper or article which has covered these things and evaluated using some metric.
Can anyone please let me know if there are any more standards (relevant to software updates and Embedded Linux based IoT in particular)?
Thanks in advance.
  • asked a question related to Security
Question
7 answers
Hi there,
I have 1 independent variable, being blockchain technology, and i have 5 dependent variables, supply chain efficiency, transparency, material traceability, security, and sustainability. On my survey I have 4 - 6 questions that relate to each of the 5 dependent variables and i am using SPSS to analyse my data. I am really struggling with what type of statistical analysis to use for my data, or if i can even use certain statistical methods that are inferential. As i have used a purposive sampling technique, all of my respondents work in organisations that utilise blockchain tehcnology within their supply chain. Im not looking for the relationship between the different dependent variables, i am just simply trying to understand if blockchain has improved any of these 5 dependent variables. How do i go about analysing my data if that is the case? I hope this makes sense and i hope someone can help me out.
Relevant answer
Answer
Hello again George Setford ,and sorry for the delay.
Simply, your IV categories are its levels. For example a gender variable has two classes or two levels (male and female)
You can choose one of the previously mentioned methods to measure the effect of IV on DVs.
  • asked a question related to Security
Question
4 answers
Especially for industrial/process control systems, there is a lot of resistance to having historized data stored in the cloud as it is seen as much less secure. Is this perception correct and if so is there any evidence for it?
Relevant answer
Answer
I do not have exact data regarding the question you are asking.
  • asked a question related to Security
Question
6 answers
I am writing a paper that focuses on the importance of centralizing file-based spatial that exist in data silos currently fragmented in file servers, email servers, web servers, document management systems, etc. Most of the solutions that consolidate spatial data are for database-based spatial data. However, much spatial data still exists in files and are unconsolidated.
One description missing from the paper is how enterprise spatial organisations are currently handling security of these spatial files, especially those that exist in data silos (fragmented in file servers, email servers, web servers, document management systems, etc).
Unfortunately, I do not know anyone in the enterprise GIS organisations and therefore its hard to know how these organisations store and handle the security of these data. Could anyone with an industry background please guide me.
  • Are these files normally stored in data silos?
  • Are there any movements towards consolidating these file data?
  • Are there any software solutions that enable consolidating these spatial files?
Any online document/paper that describes this issue which I can cite would be well appreciated.
Relevant answer
Answer
The first link contains among other things:
WHITE PAPER
An adaptive Markov chain algorithm applied over map-matching of vehicle trip GPS data
DEMO
Dynamic Telco Signal Analysis with Active Analytics
DATASHEET
Case Study: Data-Driven Network Prioritization
The second link contains also:
IDL : The Interactive Data Language Visualization Solution
  • asked a question related to Security
Question
3 answers
Hello, I am interested in using adult attachment styles as a moderator in my study, therefore I am interested in both the secure and insecure types [anxious & avoidant]. However the " Experiences in Close Relationships questionnaire" only measures two factors [anxious & avoidant] and I wonder how exactly I can measure the "secure type" in a proper way?
I would be very thankful if someone could clarify for me if its possible to measure secure type and how exactly the data can be analyzed?
Relevant answer
Answer
Alternatively, if you're willing to use state attachment as a moderator you can use the SAAM (Gillath et al., 2009), which does have a secure factor. Good luck
  • asked a question related to Security
Question
3 answers
1-Analysis of the security vulnerabilities of the protocol (MAVLink),
2- Based on the vulnerability of the MAVLink protocol, we propose an attack methodology that can disable an ongoing mission of a UAV (ethical hacking).
mission in progress (ethical hacking). This attack can be empirically validated in a dedicated platform.
3- Development of a cyber attack detection algorithm.
4- Implementation of different encryption algorithms (i.e. AES-CBC, AES-CTR, RC4 and ChaCha20) in order to secure the MAVLINK communication against attacks.
Secure the MAVLINK communication against malicious cyber-attacks.
Relevant answer
Answer
Dear Imad Khaled,
Look at the following data:
THESES AND DISSERTATIONS
Securing the MAVLink Communication Protocol
for Unmanned Aircraft Systems
  • asked a question related to Security
Question
4 answers
I am working on a security measurement framework for open source ERP software. I would like to get expert opinion on the factors that affect security attributes as defined in ISO/IEC 25010
Relevant answer
Answer
Your question focused on the CIA and AAA as commonly called in the cybersecurity world. In your question, you are more concerned with security attributes that are related to ISO/IEC 25010. That implies that you are concerned with:
(1) quality in use model and
(2) product quality model.
In addition to contribution by Ziaur Rahman
William M. Hayden Jr.
and
Krunalkumar Shah
, I suggest you review the briefs below.
  • identify software and system requirements;
  • validate the comprehensiveness of a requirements definition;
  • identify software and system design objectives;
  • identify software and system testing objectives;
  • identify quality control criteria as part of quality assurance;
  • identify acceptance criteria for a software product and/or software-intensive computer system;
  • establish measures of quality characteristics in support of these activities. (taken from https://www.iso.org/standard/35733.html)
If you are considering high availability, one of the best means of attaining close to 99.9% availability is IaaS with the infrastructure provided by CSP with SOC2 type 2 audit report. By my definition and suggestion, I am vendor neutral. Ask for SOC2 Type 2 report from any cloud service provider before using such infrastructure to guarantee high up time. Since you have identified the open source ERP, proceed to development environment or sandbox to first deploy, test and then move to production. However, ensure that the Open Source ERP has wide community support.
You can support the integrity of both the system and data with the implementation of TLS for data in transit and AES for data at rest in the cloud. If you have the fund and you plan to work remotely in your organization, you may also invest in thin-client. This will ensure both integrity and confidentiality of your data and systems.
For AAA, you must have the I - Identification system for all users. Try to use the same user identification nomenclature to simplify identity management. Perhaps, if you have a system that uses kerberos, you may plan to have a federated identification in the future or even use a SAML to provide a seamless integration of the cloud and on premise infrastructure through a TLS connection. Make your A-Authentication follow your organization's policy on password. These days, NIST recommend the use of long paraphrase instead of complex password while you may not need to set the password to expire at any date. For A-Authorization, you should adopt the least privilege and need to know principle for all users. Try to ensure a proper documentation of all authorization of access using two-man authorization principle (at least, two persons must authorize the assignment of access to any user). Finally you must enable logging of user activities, especially privilege users to guarantee A-Accountability.
For non-repudiation, the use of both symmetric and asymmetric encryption must be enforced for all users and the entire system. That means use TLS (https) for your data in motion through the browser and AES for data at rest (in database). You can always use hash to ensure for each backup to ensure the integrity of your backups.
All the above needs management full support. Try to implement a good Change Management system so that someone will not mess up your work. Users must be trained and evaluated to ensure a good success of your project.
I hope the explanation above will be helpful. You may reach me for further clarification on my email (in my profile). Thanks.
  • asked a question related to Security
Question
3 answers
While setting ORCiD ACCOUNT, it is observed that at website and social link place three options are given: only me, trusty agency, any one. Which option is better one for security purpose?
Relevant answer
Answer
Tow factor authentication (TFA) can a probable solution.
I see similar solution here.
  • asked a question related to Security
Question
5 answers
In an attempt to modernise the security control framework, the new version of ISO 27002:2022 is out. I wondered if anyone had looked remarkably at the latest version to determine the level of modernising that might have been in implementation.
I’m interested in views of the new format and structure, whether it achieves its aims of modernising the security control framework to meet the challenges of modern architectures?
Relevant answer
Answer
What is the current version of ISO 27002?
What's new in ISO 27002:2022? ISO 27002:2013 contained 114 controls, divided over 14 chapters. This has been restructured, the 2022 version contains 93 controls, divided over 4 chapters: 5.
How many controls are there in ISO 27002?
Published in October 2013, the latest version of ISO 27002 covers 14 security controls areas (numbered from 5 to 18), with implementation guidance and requirements for each specific control.
How does the ISO IEC 27001 differ from ISO IEC 27002?
The key difference between ISO 27001 and ISO 27002 is that ISO 27002 is designed to use as a reference for selecting security controls within the process of implementing an Information Security Management System (ISMS) based on ISO 27001. Organisations can achieve certification to ISO 27001 but not ISO 27002.
What is the purpose of ISO 27002?
The ISO 27002 standard is a collection of information security guidelines that are intended to help an organization implement, maintain, and improve its information security management.
What is the ISO 27002 standard?
What is ISO 27002? ISO 27002 is a supplementary standard that focuses on the information security controls that organizations might choose to implement. These controls are listed in Annex A of ISO 27001, which is what you'll often see information security experts refer to when discussing information security controls.
ISO 27001 vs. ISO 27002: What’s the difference?
https://www.itgovernance.co.uk/blo g/understanding-the-differences-between-iso-27001-and-iso-27002
  • asked a question related to Security
Question
5 answers
I wanted to work on these three topics please suggest me
Relevant answer
Answer
Dear Farath Begum ,
Here is a good topic:
Mutual authentication algorithms in client/server architectures utilizing multi-channel security communication schemes.
It involves many aspects of Identity and Access Management (IAM)
  • asked a question related to Security
Question
5 answers
How could you design a research question on miscommunications and national security and also the influence of China on the Security of some African countries. Thank you all.
Relevant answer
Answer
Dear Abdul Farouk,
Take a look at some relevant info on China as a security factor in Africa:
  • asked a question related to Security
Question
2 answers
The non-fluidity of cash currency and the frequency of developing secured, permitted and evidential rules with the Cryptos blockchain create more values within the movers of cryptocurrency agenda.
Relevant answer
Answer
Hi,
You can find the answer to your question in the below link.
best wishes
  • asked a question related to Security
Question
4 answers
It is about Data modeling explaining the entity relationship diagram in relation to security industry
Relevant answer
Answer
Dear Chrissie Chipeso,
The auxiliary information is clarifying this question as well (see the following videos):
  • asked a question related to Security
Question
1 answer
What degree does the inadequate of the implementation of ECOWAS
protocol policy on free trade movmovement affect the security situation
of West African sub-region.
Relevant answer
Answer
The Economic Community of West African States is a huge regional organization. It is a political organization and a regional economic union of 15 countries in West Africa, therefore , it can played a central role in regional security if its leaders agree to do so, a good example is when its leaders agreed to impose very harsh sanctions on Mali after the ruling military junta delayed a return to civilian rule.
  • asked a question related to Security
Question
4 answers
Currently, due to the data privacy and security concerns, there are less institutes willing to share their data. What can be done by both medical and computer science domain to deal with the issue?
Relevant answer
Answer
The current state of cybersecurity in the world doesn't allow or makes it prohibitively expensive for an easy access to open-sourced medical data. The lesser of the two evils must be chosen.
  • asked a question related to Security
Question
8 answers
If so ,at what layer it will be applied.do you give any problems in this area to do .what tool will be best to implement
Relevant answer
Answer
I think deep learning will be too heavy for the resource constrained IoT devices to handle.
  • asked a question related to Security
Question
5 answers
Blockchain technologies no doubt will increase transparency and security but I assume on the other hand it will also raise issues of privacy and identity. Though this can be controlled by using private and public keys, there are still some chances to hit it. What is your take on it?
Relevant answer
Answer
Thank you Professor
  • asked a question related to Security
Question
5 answers
Software Experts: Ever wanted to write a book? Here's an opportunity close to it that you may not want to miss. Please see
for more details.
Relevant answer
Answer
Thank you.
  • asked a question related to Security
Question
13 answers
Hi, I develop a security VANET project with python . And I use the Blockchain in RSU . I want to simulate my project. And I don't know how to do it. Please, could you help me?
Relevant answer
Answer
  • asked a question related to Security
Question
4 answers
Is anyone aware of papers or studies that explore the importance of networking for growth and securing funding in start ups?
Relevant answer
Answer
  • asked a question related to Security
Question
9 answers
Industries have been following the DevOps culture for the last decade.
Security (Sec) term is merged now with it, and the DevSecOps is getting popular in the Research area of Software Engineering. Some Cloud-Based industries have also started to follow this and implement it in their development sector.
There are some research papers on DevSecOps, and I am trying to find the research gaps; in the meantime, if any of you can support me with your valuable answers, that would be great.
Thank you so much.
NB: If you think there is any wrong with the question, please mention it. I will highly appreciate that.
Relevant answer
  • asked a question related to Security
Question
4 answers
So here is my problem to solve: People arrive at the airport, first they all go through ID check as one queue. After that, they go through personal security check, and people will choose whichever queue is the shortest at the moment. The personal security check time is unif(0.5min, 1min) and the goal is to control the waiting time within a certain length. Now I need to try different configurations of the number of the people for the security check in order to satisfy the goal of controlling the waiting time. How would I be able to do that?
I now have an arena model that has a decide module in it, set up in N-way by condition, but I have no idea what condition I should give to the module. How would I get the real-time queue length so that the person can decide to go to the shortest one? Thank you!
Relevant answer
Answer
Hi, I think you should use the decide function to select N-way by condition and write expressions like NQ(Registration.Queue)<=NQ(Registration2.Queue), the NQ() means the number of people in the queue, and the (Registration.Queue) means the queue of the registration service desk. Hope this will be helpful.
  • asked a question related to Security
Question
3 answers
Hi everybody :)
I am looking for a topic dissertation for my Cybersecurity MSc.
In the last period I got interested about 5G cybersecurity, with Core, RAN and O-RAN threats.
I want to ask if anyone has a interesting idea to develop that could became an interesting experimental/project thesis about cybersecurity aspects (penetration testing, security assessment) on these fields, and not just a survey.
Thank you anyone for your inputs!
Relevant answer
Answer
Deep Learning and SDN -based for cyber-attack detection and mitigation on 5G networks
  • asked a question related to Security
Question
3 answers
I am looking for X-ray baggage screening dataset for Anomaly detection in X-ray security screening systems.
Thanks for your help.
Relevant answer
Answer
see
chrome-extension://efaidnbmnnnibpcajpcglclefindmkaj/viewer.html?pdfurl=https%3A%2F%2Farxiv.org%2Fpdf%2F2001.01293.pdf&clen=2380896&chunk=true
  • asked a question related to Security
Question
6 answers
Is any modern Formal Security Analysis except AVISPA and SCYTHER?
Relevant answer
Answer
Mustafa: I have brought the most recent paper that survey the new practical Formal Methods for Security, for you, its 2021 paper, I hope this will help you a lot
Find the paper attached here
  • asked a question related to Security
Question
3 answers
i'm working on an iot app for physical interaction control for my research
I need to extend it. since it focuses on safety so the extending part should be to enhance security .
any ideas, some programmable security protocols, a good reference?
Relevant answer
Answer
Dear Rody Al,
You may want to look over the following info:
  • asked a question related to Security
Question
3 answers
is there any datasets for internet of medical things security to test Anomaly and Intrusion Detection System using machine learning algorithms ?
Relevant answer
Answer
  • asked a question related to Security
Question
26 answers
I am currently choosing a topic for my PhD thesis and I have 2 topic ideas but I am a little confused on which shall I proceed with and which topic would be useful and relevant.
One is regarding incorporating AI in cybersecurity and another idea is to do on something related to Mobile App Development (Hybrid app development (security & management), Low code - No code, or using AI for mobile app development).
Are there any other hot topics that I can look into, please do suggest. Thank you so much for your time.
Would really appreciate your thoughts on this :)
Relevant answer
Answer
You are interested in AI and Cyber Security, which are both wide, Cyber Security wider and not disjoint. The presented related topic, therefore, appears rather wide. A topic should be focused on solving identified existing deficiencies. Identify certain problems in an area of cyber security that an area of AI would address properly in a new way. Your supervisors would be of better help.
  • asked a question related to Security
Question
4 answers
hello everyone im doing research project in muhammad Ali jinnah and i have decided to do the research the title about i have read lots of paper im little bit confused of loopwholes can you help me plzz
  • asked a question related to Security
Question
1 answer
Hello optogenetics community,
I am currently performing optogenetic surgeries that require me to secure optic fiber implants in place over a nucleus of interest in the mouse brain. I typically secure the implants in place using layers of Metabond, which works very well (dries quickly, minimal removing of implants). However, I understand that Metabond is effective because it actually penetrates the surface it is adhering to. Fibre optics don't work if the cladding surrounding the core is damaged. Typically in my surgeries there is a little bit of fibre exposed between the ferrule and the skull, and this get's covered with Metabond. Has anyone observed a decrease in fibre implant output if it comes in contact with Metabond?
  • asked a question related to Security
Question
7 answers
can anybody help me to implement this article or gave me implemented code in contiki ?
Relevant answer
Answer
  • asked a question related to Security
Question
20 answers
Does the development and implementation of new information technologies for banking affect the processes of improving the security of online banking systems?
Improvement of online banking security systems can currently be significantly determined, among others, by the implementation of new information technologies for banking.
Are the processes of improving internet banking security systems currently determined by the implementation of new information technologies, i.e. by implementing banking data processing technologies in Big Data database systems, Business Intelligence based analytics, implementation of Blockchain technology and artificial intelligence.
Do you think that the processes of improving internet banking security systems are currently determined by the implementation of new information technologies for banking?
Please reply
Best wishes
Relevant answer
Answer
Zhu, R. (2015). An Initial Study of Customer Internet Banking Security Awareness and Behaviour in China. In PACIS (p. 87).
  • asked a question related to Security
Question
3 answers
Hello members,
I am willing to do my Ph.D. thesis on Digital Image Processing. Kindly suggest me the topic in Medical, Defence, Forensic or Security applications.
I would be very grateful for this.
Thanks in advance :)
Relevant answer
Answer
List of some hot topics are :
1. Mask detection in the corona virus era.
2. Breast Cancer Detection and Classification.
3. Liver and Lung Cancers Detection and Ranking.
  • asked a question related to Security
Question
3 answers
DNSSEC is the security extension of DNS and it is recommended to enable DNSSEC in all zones to mitigate DNS cache poisoning attacks. KSK (Key signing key) and ZSK (zone signing key) are used to generate RRSIGs of the zone records and the algorithms used to generate KSK/ZSK is very important in generating strong RRSIGs. Some of the zones has used SHA-1 as the security algorithm for KSK and ZSK. As the SHA-1 is an outdated algorithm, it is required to change the key algorithm in those zones. Anyone having any experiences in DNSSEC key algorithm roll over process, please let me know.
Thanks
Relevant answer
Answer
Dr Zeashan H. Khan Thanks for your answer and as I have noticed, this RFC is discussing about the key rollover but not the algorithm rollover. It has a small notice related to algorithm roll over but not enough details in it. Thanks and will look for more detailed resources.
  • asked a question related to Security
Question
6 answers
Greetings Colleagues
I would appreciate if you could help me collecting material/syllabus/slides/textbook/others for a new course entitled "Secure Assembly Coding "
Course Description: "This course aims to provide an overview of Assembly Language Fundamentals of Penetration Testing. Assembly language is most used programming languages in reverse engineering. It helps to understand any malware. It is used to analyze the flaw of any malware. Specific topics to be covered in this knowledge unit must at least include computer systems, data representation, numbering systems, instruction execution, symbolic coding, data word definition, laterals, location counter, indexing, indirect addressing, relative addressing, and assembly systems, reverse engineering (it tells complete working process of any application.), malwares and analyze the flaw of any malware".
Thanks in advance
Qasem
Relevant answer
Answer
Than you Dr. Len Leonid Mizrah , I hope to find more and more resources as I need to formulate a complete course for cybersecurity students
  • asked a question related to Security
Question
10 answers
In RSA cryptosystem, we generally take 1024 bits long prime numbers p and q. Is any problem if we take 512 bits long prime numbers? What are the security issues may be generated in real time scenario?
Relevant answer
Answer
I need codes to encrypt and decode images in Matlab for the following algorithms.
AES, with key 128 bit
AES, with key 256 bit
RSA, with key 1024 bit
RSA, with key 2048 bit
  • asked a question related to Security
Question
4 answers
Currently, I am exploring federated learning (FL). FL seems going to be in trend soon because of its promising functionality. Please share your valuable opinion regarding the following concerns.
  • What are the current trends in FL?
  • What are the open challenges in FL?
  • What are the open security challenges in FL?
  • Which emerging technology can be a suitable candidate to merge with FL?
Thanks for your time.
Relevant answer
Answer
I agree, there is already a publication with the name "swarm learning". the authors have applied block chain technology for security.
  • asked a question related to Security
Question
4 answers
Supervised, Unsupervised, Reinforcement, Deep learning, and federated learning (FL) are classical and contemporary techniques of machine learning. Each technique has its own advantages and disadvantages. FL does not exchange the local data samples across the edge devices, instead, it shares the model with other participating devices. Moreover, the Security and privacy of the network are also key factors in a wireless network. Therefore, Choosing an ML technique that also provides security and privacy is the need of the hour. My question is related to the security provided by federated learning. Is Federated learning secure as compared to other Machine learning techniques?
Relevant answer
Answer
In my opinion, FL is not an ML technique. Instead, it's a framework that enables a distributed environment in which you can run your ML techniques and it will assist you in preserving your privacy. Though FL has its own problem (e.g., privacy leakage from the model), merging other techniques (e.g., differential privacy) can help to mitigate these challenges. I think, now, you can answer your question by yourself.
Thanks for your time.
  • asked a question related to Security
Question
5 answers
Which is your favorite IoT security related article?
We just published an interesting article regarding to "IoT magic hashes".
"The Theory and Practice of Magic Hash Based Attacks on Lightweight Cryptographic Hash Functions in Complex IoT Environments"
Any comments and new ideas are welcome.
Norbert
Relevant answer
Answer
IoT Privacy and Security: Challenges and Solutions
  • asked a question related to Security
Question
4 answers
please tell me IOT threats that i can handle and secure using Honeypot. I want to work on one threat and continue my research and thesis work on it. please tell me Am very thankful to all. Stay blessed
Relevant answer
Answer
Dear Faheem Tariq,
True research cannot by expected easy a priori. Analysis of a new research novelty is a tedious and thoroughly work important in every research. I think, you should learn it yourself to become a true professional.
  • asked a question related to Security
Question
3 answers
please recommend me subtopic in Honeypot network security topic for my MS level research and thesis
Relevant answer
Answer
Dear Faheem Tariq,
you can use the idea of Software-Defined Networking (SDN) to improve security in the IoT - especially against DDoS Attacks - through the use of Honeypots. See these literature sources.
Best regards
Anatol Badach
Xupeng Luo, Qiao Yan, Mingde Wang, Wenyao Huang: Using MTD and SDN-based Honeypots to Defend DDoS Attacks in IoT; Computing, Communications and IoT Applications (ComComAp), Oct 2019
Jinwoo Kim, Seungwon Shin: “Software-Defined HoneyNet: Towards Mitigating Link Flooding Attacks”; 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops¸ Jun 2017