Safety and non-safety applications of VANET provides solutions for road accidents in current traffic system. security is one of the key research area for successful implementation of safety and non-safety applications...
详细信息
this research paper has been prepared to present an outline of action environment and to indicate the basis for modelling methods. Furthermore, this study produces action environment models for an anticipatory decisio...
详细信息
ISBN:
(纸本)9781622765317
this research paper has been prepared to present an outline of action environment and to indicate the basis for modelling methods. Furthermore, this study produces action environment models for an anticipatory decision-making support system. Anticipatory management is planned decision-making based on observations of the action environment, the analysis of weak signals, and the alternatives of creative problem solving. Much of the research on human decision-making involves discrete judgments in static environments under no taxing conditions. Judgments under such circumstances may not provide a sufficient basis for developing either descriptive or normative models of decision-making in dynamic, naturalistic action environments. In this study three types of action environment are differentiated: the turbulent, the dynamic, and the stable. For the modelling of the action environment for Information Warfare, the four areas of interest are information, resources, liabilities, and environment. the main contribution of this study has been to develop a process for producing a model of action environment that is useful for the actions of Information Warfare and security.
To provide a firm foundation for proofs about the security properties of a system specification or implementation, a formal statement of its security model is needed. this paper presents a formal model that correspond...
详细信息
As communication jamming technology advances, malicious methods grow more efficient and intelligent, challenging wireless system reliability and security. Traditional anti-jamming methods falter in complex environment...
详细信息
the TLS 1.3 session resumption handshakes enables a client and a server to resume a previous connection via a shared secret, which was established during a previous session. In practice, this is often done via session...
详细信息
ISBN:
(纸本)9783030884185;9783030884178
the TLS 1.3 session resumption handshakes enables a client and a server to resume a previous connection via a shared secret, which was established during a previous session. In practice, this is often done via session tickets, where the server provides a "self-encrypted" ticket containing the shared secret to its clients. A client may resume its session by sending the ticket to the server, which allows the server to retrieve the shared secret stored within the ticket. Usually, a ticket is only accepted by the server that issued the ticket. However, in practice, servers that share the same hostname, often share the same key material for ticket encryption. the concept of a server accepting a ticket, which was issued by a different server, is known as session resumption across hostnames (SRAH). In 2020, Sy et al. showed in an empirical analysis that, by using SRAH, the time to load a web-page can be reduced by up to 31% when visiting the page for the very first time. Despite its performance advantages, the TLS 1.3 specification currently discourages the use of SRAH. In this work, we formally investigate which security guarantees can be achieved when using SRAH. To this end, we provide the first formalization of SRAH and analyze its security in the multi-stage key exchange model (Dowling et al.;JoC 2021), which proved useful in previous analyses of TLS handshakes. We find that an adversary can break authentication if clients do not specify the intended receiver of their first protocol message. However, if the intended receiver is specified by the client, we prove that SRAH is secure in the multi-stage key exchange model.
this presentation will discuss complex human-information interaction problems involving information foraging, sensemaking, and lifestyle change (behavior change), predictive models of human cognition in these contexts...
详细信息
the continuously advancing digitization has provided answers to the bureaucratic problems faced by eGovernance services. this innovation led them to an era of automation, broadened the attack surface and made them a p...
详细信息
ISBN:
(纸本)9783030954840;9783030954833
the continuously advancing digitization has provided answers to the bureaucratic problems faced by eGovernance services. this innovation led them to an era of automation, broadened the attack surface and made them a popular target for cyber attacks. eGovernance services utilize the internet, which is a location addressed system in which whoever controls its location controls not only the content itself but also the integrity and the access of that content. We propose GLASS, a decentralized solution that combines the InterPlanetary File System with Distributed Ledger Technology and Smart Contracts to secure eGovernance services. We also created a testbed environment where we measure the system's performance.
the increasing integration of information technology with operational technology leads to the formation of Cyber-Physical Systems (CPSs) that intertwine physical and cyber components and connect to each other. this in...
详细信息
ISBN:
(纸本)9783030954840;9783030954833
the increasing integration of information technology with operational technology leads to the formation of Cyber-Physical Systems (CPSs) that intertwine physical and cyber components and connect to each other. this interconnection enables the offering of functionality beyond the combined offering of each individual component, but at the same time increases the cyber risk of the overall system, as such risk propagates between and aggregates at component systems. the complexity of the resulting systems in many cases leads to difficulty in analyzing cyber risk. Additionally, the selection of cybersecurity controls that will effectively and efficiently treat the cyber risk is commonly performed manually, or at best with limited automated decision support. In this paper, we extend our previous work in [1] to analyze attack paths between CPSs on one hand, and we improve the method proposed therein for selecting a set of security controls that minimizes boththe residual risk and the cost of implementation. We use the DELTA demand-response management platform for the energy market stakeholders such as Aggregators and Retailers [2] as a use case to illustrate the workings of the proposed approaches. the results are sets of cybersecurity controls applied to those components of the overall system that have been identified to lie in those attack paths that have been identified as most critical among all the identified attack paths.
It has been a tenet of the computersecurityresearch and development community that policy enforcement mechanisms must be designed into systems at the time of their conception rather than retrofitted on to existing s...
详细信息
To date, the integration of brain-computer interfaces and mixed reality headsets in Internet of Musical things (IoMusT) performance ecosystems has received remarkably little attention from the research community. To b...
详细信息
ISBN:
(纸本)9798350366532;9798350366525
To date, the integration of brain-computer interfaces and mixed reality headsets in Internet of Musical things (IoMusT) performance ecosystems has received remarkably little attention from the research community. To bridge this gap, in this paper, we present BCHJam: an IoMusT-based performance ecosystem composed of performers, audience members, brain computer interfaces, smart musical instruments, and mixed reality headsets. In BCHJam, one or more musicians are fitted with a brain -computer music interface (BCMI) giving them the possibility to actively or passively control the processing of their instrument's audio. Moreover, the BCMI's signal controls mixed reality visual effects displayed in XR headsets worn by audience members. All the components of BCHJam communicate through a Wi-Fi network via Open Sound Control messages. We refined the system through a series of test performance sessions, resulting in the creation of a signal quality filter that improved the musician's experience, along with a tuning of control parameters. the developed ecosystem was validated by realizing a musical performance. We provide a critical reflection on the achieved results and discuss the lessons learned while developing this first of its kind IoMusT performance ecosystem.
暂无评论