Security techniques
-
Research Aims: The thesis aims to develop deep neural networks for analyzing security data. These techniques improve the accuracy of machine learning-based models applied in NAD. Therefore, the thesis attempts to address the above challenging problems in NAD using models and techniques in deep neural networks. Specifically, the following problems are studied.
128p armyofthedead 23-06-2021 14 3 Download
-
Models representing uncertainty factors; data mining techniques; calculation methods of power systems taking into account uncertainty factors.
31p gaocaolon6 30-07-2020 21 2 Download
-
This chapter aims at providing a research background on mobile commerce. Also, this chapter postulates the research gaps. Briefly, it is the if and how the perception of risk and security simultaneously affects continuance intention to use mobile commerce under the influence of considerations of future consequences that generates the need to conduct this study. Also, based on the research gap, this study delineates the research methodology and research scope. Regarding the research methodology, this research includes two studies: the pilot study and the main study.
179p cothumenhmong6 17-07-2020 35 5 Download
-
The current challenges related to safety, security and economic efficiency lead to the consolidation of the level of education and training of merchant marine officers, through the interdependence and diversification of the curricula in the world economy of shipping, finance of the maritime industry and the specialized labour market.
9p christabelhuynh 04-06-2020 16 1 Download
-
Evaluating the neutronic state (neutron flux, power . . . ) of the whole nuclear core is a very important topic that has strong implication for nuclear core management and for security monitoring. The core state is evaluated using measurements and calculations.
9p christabelhuynh 31-05-2020 17 1 Download
-
In this chapter, students will be able to understand: Password policies ensure that users choose effective passwords; user-level security requires a separate account for each user; in share-level security, all users access shares by using the same passwords; a firewall is a hardware or software product that protects a network from unauthorized access, using techniques such as packet filtering, NAT, or proxy servers;...
15p tangtuy08 21-04-2016 36 3 Download
-
Objectives of Chapter 1: To define three security goals; to define security attacks that threaten security goals; to define security services and how they are related to the three security goals; to define security mechanisms to provide security services; to introduce two techniques, cryptography and steganography, to implement security mechanisms
4p levuphongqn 18-08-2015 76 2 Download
-
We now begin our look at building protocols using the basic tools that we have discussed. The discussion in this lecture will focus on issues of key establishment and the associated notion of authentication These protocols are not real, but instead are meant to serve just as a high-level survey Later lectures will go into specific protocols and will uncover practical challenges faced when implementing these protocols
20p muathu_102 28-01-2013 66 9 Download
-
The Devil said to Daniel Webster: "Set me a task I can't carry out, and I'll give you anything in the world you ask for." Daniel Webster: "Fair enough. Prove that for n greater than 2, the equation an + bn = cn has no non-trivial solution in the integers." They agreed on a three-day period for the labor, and the Devil disappeared. At the end of three days, the Devil presented himself, haggard, jumpy, biting his lip. Daniel Webster said to him, "Well, how did you do at my task? Did you prove the theorem?' "Eh? No . . . no, I haven't...
18p muathu_102 28-01-2013 50 3 Download
-
Protect web content from those who don’t have a “need to know” Require users to authenticate using a userid/password before they are allowed access to certain URLs HTTP/1.1 requires that when a user makes a request for a protected resource the server responds with a authentication request header WWW-Authenticate contains enough pertinent information to carry out a “challenge-response” session between the user and the server
13p muathu_102 28-01-2013 50 3 Download
-
Used to connect two private networks together via the Internet Used to connect remote users to a private network via the Internet This could be done by opening your firewall to the LAN networking protocols (NETBIOS, NFS NetWare, AppleTalk)) But… it would also make those protocols available to any one on the Internet and they could come into your LAN at will Effectively make the whole Internet your LAN Exposes all of your data Anyone can easily take advantage of vulnerabilities in your internal hosts No privacy Better solution is to use a VPN in conjunction with your firewall ...
18p muathu_102 28-01-2013 83 4 Download
-
Biggest problem is figuring out who a piece of mail is really from Must use a higher level mechanism for trust or privacy Most SMTP clients use sendmail which has been a constant source of security problems for years
15p muathu_102 28-01-2013 40 2 Download
-
You don’t have to know all of the details You do need to know your system What services it is providing What protocols are involved What vulnerabilities is has How to minimize the risks
18p muathu_102 28-01-2013 39 1 Download
-
Security-Enhanced Linux (SELinux) is an implementation of mandatory access control using Linux Security Modules (LSM) in the Linux kernel, based on the principle of least privilege. It is not a Linux distribution, but rather a set of modifications that can be applied to Unix-like operating systems, such as Linux and BSD.
15p muathu_102 28-01-2013 94 11 Download
-
Developed 1996 as a teaching tool Santa Clara University\ Prof. Edward Schaefer Takes an 8-bit block plaintext, a 10 –bit key and produces an 8-bit block of ciphertext Decryption takes the 8-bit block of ciphertext, the same 10-bit key and produces the original 8-bit block of plaintext
13p muathu_102 28-01-2013 41 2 Download
-
cacls /T /E /G administrator:F d:\users\*.* Cacls will add Full Control for the adminsitrator account all files and subfolders in the Users folder of the D:\ drive. cacls /T /E /R Everyone d:\users Cacls will remove all permissions for the 'Everyone' group in all files and subfolders in the Users folder of the D:\ drive. Be sure to use the /E switch when you are just making modifications to a specific account or group. Without the /E switch, your settings will replace the current security with only what is specified. ...
19p muathu_102 28-01-2013 28 2 Download
-
Security Service – a service provided by a protocol layer of communicating open systems, which ensures adequate security of the systems or of data transfers RFC 2828 – a processing or communication service that is provided by a system to give a specific kind of protection to system resources; security services implement security policies and are implemented bt security mechanisms.
14p muathu_102 28-01-2013 36 3 Download
-
Raw Sockets let you program at just above the network (IP) layer You could program at the IP level using the IP API but you can’t get at ICMP Raw Sockets expose ICMP you get a Raw Packet and populate the entire packet yourself for high level protocols like TCP and UDP you lose all of the functionality implemented in those layers choosing to use a Raw Socket must be weighed carefully Raw Sockets can be dangerous Raw Sockets can be against the law http://www.kumite.com/rsnbrgr/rob/grcspoof/cnn/ ...
9p muathu_102 28-01-2013 45 3 Download
-
Never trust user input Poorly or unvalidated user input constitutes the most severe security problem with web applications can crash a server can cause buffer overflows can allow machine to be hijacked allow hacker to have root access Assume user input is bad until you prove its OK
10p muathu_102 28-01-2013 50 4 Download
-
Part of an overall Firewall strategy Sits between the local network and the external network Originally used primarily as a caching strategy to minimize outgoing URL requests and increase perceived browser performance Primary mission is now to insure anonymity of internal users Still used for caching of frequently requested files Also used for content filtering Acts as a go-between, submitting your requests to the external network Requests are translated from your IP address to the Proxy’s IP address E-mail addresses of internal users are removed from request headers Cause an actual brea...
15p muathu_102 28-01-2013 79 4 Download