Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Computer security (3)
- Data encryption (Computer science) (2)
- AGA-12 (1)
- Analysis (1)
- Application Layer (1)
-
- Asymmetric Cryptography (1)
- Attack (1)
- Computer crimes (1)
- Computer simulation (1)
- Critical Infrastructure system (1)
- Cyberterrorism – Prevention (1)
- DDoS Attacks (1)
- Data protection (1)
- Denial of service attacks (1)
- Detection and Defense (1)
- Electronic information resources – Access control (1)
- Electronic records (1)
- IEC 62351 (1)
- Insider (1)
- Mathematics (1)
- NTRU (1)
- Process control (1)
- SCADA security (1)
- Sabotage in the workplace (1)
- Simulation (1)
- Simulator (1)
- Supervisory control systems (1)
- Threat (1)
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Entire DC Network
Encryption And Decryption Using Matricies, Amit Etiel, James Parsons, Shawn Jenkins-Edwards
Encryption And Decryption Using Matricies, Amit Etiel, James Parsons, Shawn Jenkins-Edwards
Math 365 Class Projects
Mathematician Lester Hill developed the Hill Cipher, the first mathematical encryption method ever developed, in 1929. This method was created in order to strengthen the level of security of previous methods and made it possible to encrypt more than three symbols at a time.
A Survey On Detection And Defense Of Application Layer Ddos Attacks, Naga Shalini Vadlamani
A Survey On Detection And Defense Of Application Layer Ddos Attacks, Naga Shalini Vadlamani
UNLV Theses, Dissertations, Professional Papers, and Capstones
As the time is passing on, the effect of DDoS attacks on Internet security is growing tremendously. Within a very little span there is a huge increase in the size and frequency of DDoS attacks. With the new technologies and new techniques, the attackers are finding more sophisticated ways to attack the servers. In this situation, it is necessary to come up with various mechanisms to detect and defend these DDoS attacks and protect the servers from the attackers. Many researches have been carried out to detect the DDoS attack traffic in transport layer, which is more vulnerable to DDoS …
Application Of Ntru Cryptographic Algorithm For Securing Scada Communication, Amritha Puliadi Premnath
Application Of Ntru Cryptographic Algorithm For Securing Scada Communication, Amritha Puliadi Premnath
UNLV Theses, Dissertations, Professional Papers, and Capstones
Supervisory Control and Data Acquisition (SCADA) system is a control system which is widely used in Critical Infrastructure System to monitor and control industrial processes autonomously. Most of the SCADA communication protocols are vulnerable to various types of cyber-related attacks. The currently used security standards for SCADA communication specify the use of asymmetric cryptographic algorithms like RSA or ECC for securing SCADA communications. There are certain performance issues with cryptographic solutions of these specifications when applied to SCADA system with real-time constraints and hardware limitations. To overcome this issue, in this thesis we propose the use of a faster and …
Simulation And Analysis Of Insider Attacks, Christopher Blake Clark
Simulation And Analysis Of Insider Attacks, Christopher Blake Clark
UNLV Theses, Dissertations, Professional Papers, and Capstones
An insider is an individual (usually an employee, contractor, or business partner) that has been trusted with access to an organization's systems and sensitive data for legitimate purposes. A malicious insider abuses this access in a way that negatively impacts the company, such as exposing, modifying, or defacing software and data.
Many algorithms, strategies, and analyses have been developed with the intent of detecting and/or preventing insider attacks. In an academic setting, these tools and approaches show great promise. To be sure of their effectiveness, however, these analyses need to be tested. While real data is available on insider attacks …
Control Of The Electronic Management Of Information, A. Boone, R. Szatmary Jr.
Control Of The Electronic Management Of Information, A. Boone, R. Szatmary Jr.
Publications (YM)
This procedure establishes the responsibilities and provides direction for developing and evaluating the adequacy of process controls on specific uses of electronically stored information. These uses include, but are not limited to, information used in design input, developed as design output, or developed as input to or output from scientific investigation or performance assessment modeling and analysis. This pertains to information that resides in an electronic information management system or on electronic media.