Security of Information and Networks
نویسندگان
چکیده
This special issue aims to make people aware and up to date of the innovative research in the area of emerging techniques and methods in security of information and network. The majority of organizations in the commercial and government sectors are relying completely on their computer and network systems. Extensive attacks can cause heavy loss in a few seconds. Therefore, securing their computers, networks, and information is imperative. Based on the importance of security and interest of the researchers, this special issue is focused on attracting good work on innovative methods and techniques in order to address unique security issues which are introduced by new computing paradigms and techniques. This special issue presents the following papers in the most active areas of research in security of information and networks. The brief introduction of the selected papers is provided. O. Tayan et al. proposed the paper " A Hybrid Digital-Signature and Zero-Watermarking Approach for Authenti-cation and Protection of Sensitive Electronic Documents. " This paper addresses the problems and threats associated with verification of integrity, proof-of-authenticity, tamper-detection, and copyright protection for digital-text content. The proposed algorithm was implemented and shown to be robust against undetected content modifications and is capable of confirming proof-of-originality whilst detecting and locating deliberate/nondeliberate tampering. Additionally , enhancements in resource-utilization and reduced redundancies were achieved in comparison to traditional encryption-based approaches. Y. Liu et al., worked on the paper " Network Anomaly Detection System with Optimized DS Evidence Theory " in which a novel network anomaly detection system is proposed with Optimized Dempster-Shafer (ODS) evidence theory and Regression Basic Probability Assignment (RBPA) function. In this model, the authors add weights to each senor to optimize DS evidence theory according to its previous predicted accuracy and RBPA employs sensor's regression ability to address complex network. They proved that this network anomaly detection model has a better detection rate, and RBPA and ODS optimization methods can improve system performance significantly. A. Soleymani et al. proposed the paper " A Chaotic Cryptosystem for Images Based on Henon and Arnold Cat Map. " In this paper, an encryption scheme is presented for securing images based on Arnold cat and Henon chaotic maps. The scheme uses Arnold cat map for bit and pixel-level permutations on plain and secret images, while Henon map creates secret images and specific parameters for the permutations. Both the encryption and decryption processes are explained, formulated, and graphically presented. …
منابع مشابه
Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملAnalysis and Evaluation of Privacy Protection Behavior and Information Disclosure Concerns in Online Social Networks
Online Social Networks (OSN) becomes the largest infrastructure for social interactions like: making relationship, sharing personal experiences and service delivery. Nowadays social networks have been widely welcomed by people. Most of the researches about managing privacy protection within social networks sites (SNS), observes users as owner of their information. However, individuals cannot co...
متن کاملA novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملInterdependent Security Game Design over Constrained Linear Influence Networks
In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...
متن کاملDetecting Bot Networks Based On HTTP And TLS Traffic Analysis
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
متن کاملLPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
دوره 2015 شماره
صفحات -
تاریخ انتشار 2015