A domain-specific language for the specification of UCON policies
- Antonia M. Reina Quintero,
- Salvador Martínez Pérez,
- Ángel Jesús Varela-Vaca,
- María Teresa Gómez López,
- Jordi Cabot
Security policies constrain the behavior of all users of an information system. In any non-trivial system, these security policies go beyond simple access control rules and must cover more complex and dynamic scenarios while providing, ...
Highlights
- A domain-specific language for UCON policies is defined.
- The domain-specific ...
An efficient multimedia compression-encryption scheme using latin squares for securing Internet-of-things networks
- Walid El-Shafai,
- Ahmed K. Mesrega,
- Hossam Eldin H. Ahmed,
- Nirmeen A. El-Bahnasawy,
- Fathi E. Abd El-Samie
The security of multimedia content and its applications have become a a very important task in digital communication technology. The extensive use of multimedia content over wireless networks makes the network applications exposed to ...
Assessing cyber threats for storyless systems
A proper assessment of potential cyber threats is vital for security decision-making. This becomes an even more challenging task when dealing with new system designs and industry sectors where there is little or no historical data ...
Securing emergent behaviour in swarm robotics
Swarm robotics is the study of how a large number of relatively simple robots can be designed so that a desired collective behaviour emerges from the local interactions among robots and between the robots and their environment. While ...
AICrit: A unified framework for real-time anomaly detection in water treatment plants
Industrial Control Systems (ICS) in public infrastructure, such as water treatment and distribution plants, have become a target of sophisticated cyber-attacks. Given the ever-present insider and other threats in such systems, there is ...
DTMIC: Deep transfer learning for malware image classification
In the ever-changing cyber threat landscape, evolving malware threats demand a new technique for their detection. This paper puts forward a strategy for distinguishing malware programs based on transfer learning procedures. The ...
A novel method to generate key-dependent s-boxes with identical algebraic properties
The s-box plays the vital role of creating confusion between the ciphertext and secret key in any cryptosystem, and is the only nonlinear component in many block ciphers. Dynamic s-boxes, as compared to static, improve entropy of the ...
Multi-level reversible data hiding for crypto-imagery via a block-wise substitution-transposition cipher
The research of reversible data hiding in crypto-imagery has attracted considerable attention due to privacy concerns in cloud computing applications. The schemes that vacate spare room after block-wise image encryption can avoid ...
Social network behavior and public opinion manipulation
The scope of cyberspace weapons is expanding from the physical network domain to the cognitive information domain. Technologies such as network penetration, public opinion guidance and attacks, cognitive intervention and control will ...
How is your Wi-Fi connection today? DoS attacks on WPA3-SAE
WPA3-Personal renders the Simultaneous Authentication of Equals (SAE) password-authenticated key agreement method mandatory. The scheme achieves forward secrecy and is highly resistant to offline brute-force dictionary attacks. Given ...
ESAR: Enhanced Secure Authentication and Revocation Scheme for Vehicular Ad Hoc Networks
Vehicle Ad Hoc Network (VANET) systems that use Public Key Infrastructure (PKI) experience significant delays when checking Certificate Revocation Lists (CRLs) and performing key pair-based asymmetric cryptographic operations. This ...
Deep multi-task learning for malware image classification
Malicious software is a pernicious global problem. A novel multi-task learning framework is proposed in this paper for malware image classification for accurate and fast malware detection. We generate bitmap (BMP) and (PNG) images from ...
Controllable software licensing system for sub-licensing
The digital rights management is mainly about license management. Take software licensing as an example. A software license can be assigned to a user, a group of users, or an organization. To protect the copyright against software ...
Secure Blockchain-Internet of Vehicles (B-IoV) Mechanism using DPSO and M-ITA Algorithms
The Internet of Vehicles (IoV) is introduced to transfer/exchange the data among roadside units and vehicles through various smart devices in real time scenarios. However, the past works in IoV leads to various transparencies, security ...
B-DAC: A decentralized access control framework on Northbound interface for securing SDN using blockchain
Software-Defined Network (SDN) is a new arising terminology of network architecture with outstanding features of orchestration by decoupling the control plane and the data plane in each network element. Even though it brings several ...
A new lattice-based authentication scheme for IoT
In this paper, we propose a lattice-based authentication scheme for IoT technologies such as RFID systems. The security of the proposed scheme is based on ISIS problem which helps to resist to quantum attacks. The proposed scheme ...