-
481
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01“… Information security is paramount for individuals, companies, and governments. …”
Get full text
Article -
482
Research on evolution and security risk of Metaverse
Published 2022-04-01“…Recently, the Metaverse boom has swept the world.To improve the voice in the future digital field, major countries and well-known enterprises have accelerated arrangement of this emerging industry.However, there is no unified definition and ultimate form description of Metaverse.It is urgent to understand the essential characteristics, evolution trend and security risks of Metaverse scientifically, which can promote the high-quality development of China’s electronic information industry and ensure the cyberspace security.With literature research and related information analysis, the definition of Metaverse was put forward based on the core concepts such as technology and application iteration, economic and business model and the role of social relations.Additionally, the development and evolution of Metaverse were divided into four stages (data creation, digital bionics, virtual mirror and virtual-real symbiosis) according to the evolution degree of space category, space-time dimension, key technology and virtual real interaction.And the characteristics and corresponding forms of each stage were expounded.Then it analyzed the main reasons for the popularity of the Metaverse from the perspectives of innovative application demand, virtual life transformation, commercial value driving and political power driving.Focusing on the problems of challenging the national governance system, impacting the mainstream ideology, manipulating the capital market, causing potential social problems and misleading the layout of technology industry, it analyzed the multiple security risks and threats brought by the Metaverse wave from perspectives including politics, culture, economy, society and technology.It is suggested that the Metaverse is still in the stage of concept improvement and product exploration now.China should rationally grasp the development opportunities of the Metaverse based on the current situation of the electronic information industry, prepare for risks in advance, build a digital governance supervision system, stimulate industrial innovation and open development, consolidate the support of network information security, and create a healthy and orderly international environment.…”
Get full text
Article -
483
Comparative assessment of the state of digitalisation in higher education institutions
Published 2024-09-01“…This methodology encompasses four spheres of digitalisation: management and information security, organisation of the educational process, organisation of extracurricular activities, and profiling. …”
Get full text
Article -
484
Protection of personal data under martial law in Ukraine
Published 2023-09-01“…The conclusions presented in this article can be a valuable source of information for legislators and information security professionals dealing with personal data protection under martial law. …”
Get full text
Article -
485
Processing streams in a monitoring cloud cluster
Published 2020-01-01“…Hadoop web-programming environment is the technological basis for the development of algorithmic and software solutions for the synthesis of monitoring clusters, including information security and information counteraction systems. …”
Get full text
Article -
486
-
487
Manipulating energy migration in nanoparticles toward tunable photochromic upconversion
Published 2024-12-01“…These findings offer a deep insight into the understanding of upconversion dynamics and provide a versatile approach to manipulating the energy flux in nanostructures with tunable emission colors, showing great promise in applications of logic operation and information security.…”
Get full text
Article -
488
Time-bin entangled Bell state generation and tomography on thin-film lithium niobate
Published 2024-12-01“…Our results, combined with the established large electro-optic bandwidth of lithium niobate, showcase the platform as perfect candidate to realise fibre-coupled, high-speed time-bin quantum communication modules that exploit entanglement to achieve information security.…”
Get full text
Article -
489
APPLICATION OF ARTIFICIAL INTELLIGENCE FOR IMPROVING SITUATIONAL TRAINING OF CYBERSECURITY SPECIALISTS
Published 2023-10-01“…The analysis conducted in this work allowed us to conclude the need for improvement of the situational teaching method as one of the main ways to develop the competencies of students majoring in Cybersecurity and Information Security in higher education institutions. One of the ways to improve the method is to use artificial intelligence tools in creating various types of tasks for classes. …”
Get full text
Article -
490
Long-Term Monitoring of Individuals With Chronic Obstructive Pulmonary Disease Using Digital Health Technology: Qualitative Study
Published 2025-02-01“…By addressing identified barriers and capitalizing on facilitators, advancements can be made in the development and use of DHT, especially in overcoming challenges such as information security and operational methods. The implementation of the recommended strategies will likely lead to improved COPD care outcomes.…”
Get full text
Article -
491
Evaluation of Network Security Service Provider Using 2-Tuple Linguistic Complex q-Rung Orthopair Fuzzy COPRAS Method
Published 2022-01-01“…However, many enterprises lack the necessary resources to secure information security, and selecting the best network security service provider has become a real issue for many enterprises. …”
Get full text
Article -
492
Efficient Implementation of Mahalanobis Distance on Ferroelectric FinFET Crossbar for Outlier Detection
Published 2024-01-01“…Mahalanobis distance, the multivariate equivalent of the Euclidean distance, is used to detect the outliers in the correlated data accurately and finds widespread application in fault identification, data clustering, singleclass classification, information security, data mining, etc. However, traditional CMOS-based approaches to compute Mahalanobis distance are bulky and consume a huge amount of energy. …”
Get full text
Article -
493
Physical One‐Way Functions for Decentralized Consensus Via Proof of Physical Work
Published 2025-02-01Get full text
Article -
494
Intelligent Ensemble Deep Learning System for Blood Glucose Prediction Using Genetic Algorithms
Published 2022-01-01Get full text
Article -
495
Formation of Russian magistracy: implementation of the digital economy requests in the educational process
Published 2020-02-01“…As the main results, information on the use of modern educational technologies in the preparation of Russian undergraduates has been given – a conclusion has been made about the small distribution of on-line education and network programs in universities.The research data characterizing the degree of digital competencies of Russian graduate students have been adduced: information search and processing, use of IT technologies, information security, ability to work with «big» data. It has been noted, that these skills are well developed among modern students, but the participation of universities in their development is low. …”
Get full text
Article -
496
Hardcoded vulnerability detection approach for IoT device firmware
Published 2022-10-01“…With the popularization of IoT devices, more and more valuable data is generated.Analyzing and mining big data based on IoT devices has become a hot topic in the academic and industrial circles in recent years.However, due to the lack of necessary detection and protection methods, many IoT devices have serious information security risks.In particular, device hard-coded information is closely related to system encryption and decryption, identity authentication and other functions, which can provide confidentiality protection for core data.Once this information is exploited by malicious attackers, serious consequences such as sensitive information leakage, backdoor attacks, and unauthorized logins will occur.In response to this problem, a multi-type character recognition and positioning scheme was designed and a hard-coded vulnerability detection method in executable files was proposed based on the study of the characteristics of hard-coded vulnerabilities in IoT devices.The proposed method extracted the firmware of IoT devices and filtered all executable files as the source to be analyzed.Then, a solution to identify and locate three types of hard-coded characters was provided.Further, the reachability of the function, where the hard-coded character was located, was analyzed according to the function call relationship.Meanwhile, the instruction heterogeneity was mitigated by an intermediate representation (IR) model.The character and parameter hard-coded values was obtained through a data flow analysis approach.A symbolic execution method was devised to determine the trigger conditions of the hard-coded vulnerabilities, and then the vulnerability detection result was output.On the one hand, the proposed method introduced the method of symbolic execution based on the use of the intermediate representation model, which eliminated the dependency of instruction architecture and reduces the false positive rate of vulnerabilities; On the other hand, this method can integrate characters, files, and cryptographic implementation to realize the different characteristics of three types of hard-coded characters, which increased the coverage of vulnerability detection and improves the versatility of the detection method.The experimental results show that the proposed method can effectively detect three types of hard-coded vulnerabilities of characters, files and cryptographic implementation in various IoT devices, and has good detection accuracy, which can provide certain guidance for the deployment of subsequent security protection technologies.…”
Get full text
Article -
497
Modern trends and conceptual approaches to understanding the essence of the concept of “national security”
Published 2022-12-01“…More specific varieties of the legal definition of “security”, which correlate with it as “general” and “special” categories, are the concepts of “national security”, “state security”, “public security”, “personal security”, and derivatives from them, such as “military security”, “economic security”, “information security” and other types of security, are allocated in a separate type in numerous scientific works of Ukrainian and foreign specialists depending on the object of protection, the sphere of social relations, and the types of practical activities of various state bodies. …”
Get full text
Article -
498
-
499
Implementasi Teknologi Blockchain dengan Sistem Smart Contract pada Klaim Asuransi
Published 2024-10-01“…With these problems can cause problems related to information security in the form of data integrity, data confidentiality, and data transparency on insurance claims. …”
Get full text
Article -
500
Generic, specific and direct object of a crime under the Article 330 of the Criminal Code of Ukraine
Published 2018-12-01“…Accordingly, the specific object of this crime is more narrow range of specific social relations that are associated with ensuring the state of information security. It was formulated as social relations that exist with regard to the security of state secrets and official information gathered in the process of operative and search, counter-intelligence activities, in the field of the country defense. …”
Get full text
Article