520,667 research outputs found

    Major models of economic security evaluation at enterprises and their applicability to telecommunication companies

    Get PDF
    Purpose: This article aims at synthesizing existing research areas and approaches to assessing the level of economic security at the corporate level and adapt the results to the specifics of the telecommunication's industry. Effective study of the problem of economic security is possible only in case of the combination of distribution, market, and institutional paradigms, based on the combination of methodological and empirical-quantitative approaches. Design/Methodology/Approach: The article meaningfully describes the main approaches to the definition and methods for assessing the economic security of enterprises, as well as the applicability of these methods to Russian telecommunication's companies. Based on this analysis, strategic directions to ensure the economic security of modern Russian telecommunication's enterprises have been determined. Findings: Four strategic directions can be identified to improve economic security: improving telecommunication and information technologies; creating and selling new telecommunication products and services; improving business processes; increasing energy efficiency and production ecology. Practical Implications: The results of the analysis can be used to determine the main directions of ensuring the economic security of a telecommunication's company. Originality/Value: The originality of the authors'approach is to develop and test the conceptual approach to assessing the economic security of corporate entities and the opportunity for its industry adaptation to the features and business processes of specific types of economic activity.peer-reviewe

    Intelligent Intrusion Detection System Using Genetic Algorithm

    Get PDF
    Intrusion detection is an essential and important technique in research field. One of the main challengesin the security system of large-scale high-speed networks is the detection of suspicious anomalies in network traffic patterns due to different kinds of network attack. We give attacks normally identified by intrusion detection systems. Differentiation can be done in existing intrusion detection methods and systems based on the underlying computational methods used. Intrusion detection methods started appearing in the last few years. In this paper we propose an Intrusion detection method using Genetic Algorithm (GA). In this research contribution of each of above mentioned techniques will be systematically summarized and compared that will allows us to clearly define existing research challenges, and to highlight promising new research directions

    Safety, security and privacy in machine learning based Internet of Things

    Get PDF
    Recent developments in communication and information technologies, especially in the internet of things (IoT), have greatly changed and improved the human lifestyle. Due to the easy access to, and increasing demand for, smart devices, the IoT system faces new cyber-physical security and privacy attacks, such as denial of service, spoofing, phishing, obfuscations, jamming, eavesdropping, intrusions, and other unforeseen cyber threats to IoT systems. The traditional tools and techniques are not very efficient to prevent and protect against the new cyber-physical security challenges. Robust, dynamic, and up-to-date security measures are required to secure IoT systems. The machine learning (ML) technique is considered the most advanced and promising method, and opened up many research directions to address new security challenges in the cyber-physical systems (CPS). This research survey presents the architecture of IoT systems, investigates different attacks on IoT systems, and reviews the latest research directions to solve the safety and security of IoT systems based on machine learning techniques. Moreover, it discusses the potential future research challenges when employing security methods in IoT systems

    Cybersecurity: Past, Present and Future

    Full text link
    The digital transformation has created a new digital space known as cyberspace. This new cyberspace has improved the workings of businesses, organizations, governments, society as a whole, and day to day life of an individual. With these improvements come new challenges, and one of the main challenges is security. The security of the new cyberspace is called cybersecurity. Cyberspace has created new technologies and environments such as cloud computing, smart devices, IoTs, and several others. To keep pace with these advancements in cyber technologies there is a need to expand research and develop new cybersecurity methods and tools to secure these domains and environments. This book is an effort to introduce the reader to the field of cybersecurity, highlight current issues and challenges, and provide future directions to mitigate or resolve them. The main specializations of cybersecurity covered in this book are software security, hardware security, the evolution of malware, biometrics, cyber intelligence, and cyber forensics. We must learn from the past, evolve our present and improve the future. Based on this objective, the book covers the past, present, and future of these main specializations of cybersecurity. The book also examines the upcoming areas of research in cyber intelligence, such as hybrid augmented and explainable artificial intelligence (AI). Human and AI collaboration can significantly increase the performance of a cybersecurity system. Interpreting and explaining machine learning models, i.e., explainable AI is an emerging field of study and has a lot of potentials to improve the role of AI in cybersecurity.Comment: Author's copy of the book published under ISBN: 978-620-4-74421-

    Towards Safer Smart Contracts: A Survey of Languages and Verification Methods

    Get PDF
    With a market capitalisation of over USD 205 billion in just under ten years, public distributed ledgers have experienced significant adoption. Apart from novel consensus mechanisms, their success is also accountable to smart contracts. These programs allow distrusting parties to enter agreements that are executed autonomously. However, implementation issues in smart contracts caused severe losses to the users of such contracts. Significant efforts are taken to improve their security by introducing new programming languages and advance verification methods. We provide a survey of those efforts in two parts. First, we introduce several smart contract languages focussing on security features. To that end, we present an overview concerning paradigm, type, instruction set, semantics, and metering. Second, we examine verification tools and methods for smart contract and distributed ledgers. Accordingly, we introduce their verification approach, level of automation, coverage, and supported languages. Last, we present future research directions including formal semantics, verified compilers, and automated verification

    Secure Watermarking for Multimedia Content Protection: A Review of its Benefits and Open Issues

    Get PDF
    Distribution channels such as digital music downloads, video-on-demand, multimedia social networks, pose new challenges to the design of content protection measures aimed at preventing copyright violations. Digital watermarking has been proposed as a possible brick of such protection systems, providing a means to embed a unique code, as a fingerprint, into each copy of the distributed content. However, application of watermarking for multimedia content protection in realistic scenarios poses several security issues. Secure signal processing, by which name we indicate a set of techniques able to process sensitive signals that have been obfuscated either by encryption or by other privacy-preserving primitives, may offer valuable solutions to the aforementioned issues. More specifically, the adoption of efficient methods for watermark embedding or detection on data that have been secured in some way, which we name in short secure watermarking, provides an elegant way to solve the security concerns of fingerprinting applications. The aim of this contribution is to illustrate recent results regarding secure watermarking to the signal processing community, highlighting both benefits and still open issues. Some of the most interesting challenges in this area, as well as new research directions, will also be discussed

    ENSURING ECONOMIC SECURITY OF RUSSIA IN THE CONTEXT OF AFRICAN DEVELOPMENT TRENDS: PROBLEMS AND PROSPECTS

    Get PDF
    Abstract Purpose: A new scientific problem is posed and substantiated: the need to take into account the African economic development trends in the system of ensuring the economic security of Russia. In this context, in order to assess the security of the national economy and the competitive position of Russia, the results of scientific studies of the main development trends and threats in Africa, the position of various countries on the African continent are analyzed. Methodology: The authors are based on the analysis of current scientific literature, government official documents, and statistical reports. The main methods of research are analytical review, comparison, systematic approach, cultural and civilizational approach. Result: The article substantiates the position that taking into account the development trends of the African continent is an important component in the system of assessing the national economic security of Russia in the current period and in the future, ensuring competitiveness and strengthening the economic sovereignty of Russia, analyzing the potential of interaction with African countries in the management practice. Applications: This research can be used for the universities, teachers and education students. Novelty/Originality: The authors formulate the main directions of the activation of scientific research and concentration of practical efforts to improve the national economic security of Russia in the context of the development trend of the African continent
    • …
    corecore