Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (4)
- Aerospace Engineering (2)
- Aviation (2)
- Computer Engineering (2)
- Digital Communications and Networking (2)
-
- Electrical and Computer Engineering (2)
- Management and Operations (2)
- Multi-Vehicle Systems and Air Traffic Control (2)
- Science and Technology Studies (2)
- Business (1)
- Electrical and Electronics (1)
- Management Information Systems (1)
- Social Control, Law, Crime, and Deviance (1)
- Sociology (1)
- Systems and Communications (1)
- Technology and Innovation (1)
- Institution
- Publication
Articles 1 - 9 of 9
Full-Text Articles in Engineering
On Modeling Eavesdropping Attacks In Wireless Networks, Xuran Li, Jianlong Xu, Hong-Ning Dai, Qinglin Zhao, Chak Fong Cheang, Qiu Wang
On Modeling Eavesdropping Attacks In Wireless Networks, Xuran Li, Jianlong Xu, Hong-Ning Dai, Qinglin Zhao, Chak Fong Cheang, Qiu Wang
Hong-Ning Dai
This paper concerns the eavesdropping attacks from the eavesdroppers’ perspective, which is new since most of current studies consider the problem from the good nodes’ perspective. In this paper, we originally propose an analytical framework to quantify the effective area and the probability of the eavesdropping attacks. This framework enables us to theoretically evaluate the impact of node density, antenna model, and wireless channel model on the eavesdropping attacks. We verify via extensive simulations that the proposed analytical framework is very accurate. Our results show that the probability of eavesdropping attacks significantly vary, depending on the wireless environments (such as …
Dg Mosfet, Mojtaba Mehrdad Nasehi Phd In Electronics, Computer Networks
Dg Mosfet, Mojtaba Mehrdad Nasehi Phd In Electronics, Computer Networks
mojtaba nasehi
No abstract provided.
Fault Tree Analysis For Safety/Security Verification In Aviation Software, Andrew J. Kornecki, Mingye Liu
Fault Tree Analysis For Safety/Security Verification In Aviation Software, Andrew J. Kornecki, Mingye Liu
Andrew J. Kornecki
The Next Generation Air Traffic Management system (NextGen) is a blueprint of the future National Airspace System. Supporting NextGen is a nation-wide Aviation Simulation Network (ASN), which allows integration of a variety of real-time simulations to facilitate development and validation of the NextGen software by simulating a wide range of operational scenarios. The ASN system is an environment, including both simulated and human-in-the-loop real-life components (pilots and air traffic controllers).Real Time Distributed Simulation (RTDS) developed at Embry-Riddle Aeronautical University, a suite of applications providing low and medium fidelity en-route simulation capabilities, is one of the simulations contributing to the ASN. …
Development Of A Master Of Software Assurance Reference Curriculum, Andrew J. Kornecki, James Mcdonald, Julia H. Allen, Mark Ardis, Nancy Mead, Richard Linger, Thomas B. Hilburn
Development Of A Master Of Software Assurance Reference Curriculum, Andrew J. Kornecki, James Mcdonald, Julia H. Allen, Mark Ardis, Nancy Mead, Richard Linger, Thomas B. Hilburn
Andrew J. Kornecki
The Next Generation Air Traffic Management system (NextGen) is a blueprint of the future National Airspace System. Supporting NextGen is a nation-wide Aviation Simulation Network (ASN), which allows integration of a variety of real-time simulations to facilitate development and validation of the NextGen software by simulating a wide range of operational scenarios. The ASN system is an environment, including both simulated and human-in-the-loop real-life components (pilots and air traffic controllers).Real Time Distributed Simulation (RTDS) developed at Embry-Riddle Aeronautical University, a suite of applications providing low and medium fidelity en-route simulation capabilities, is one of the simulations contributing to the ASN. …
Public Street Surveillance: A Psychometric Study On The Perceived Social Risk, David J. Brooks
Public Street Surveillance: A Psychometric Study On The Perceived Social Risk, David J. Brooks
David J Brooks Dr.
Public street surveillance, a domain of Closed Circuit Television (CCTV), has grown enormously and is becoming common place with increasing utilization in society as an all-purpose security tool. Previous authors (Ditton, 1999; Davies, 1998; Horne, 1998; Tomkins, 1998) have raised concern over social, civil and privacy issues, but there has been limited research to quantify these concerns. There are a number of core aspects that could relocate the risk perception and therefore, social support of public street surveillance. This study utilized the psychometric paradigm to quantitatively measure the social risk perception of public street surveillance. The psychometric paradigm is a …
Perceived Barriers For Implanting Microchips In Humans: A Transnational Study, Christine Perakslis, Katina Michael, M.G. Michael, Robert Gable
Perceived Barriers For Implanting Microchips In Humans: A Transnational Study, Christine Perakslis, Katina Michael, M.G. Michael, Robert Gable
Professor Katina Michael
This quantitative, descriptive study investigated if there was a relationship between countries of residence of small business owners (N = 453) within four countries (Australia, India, UK, and the USA) with respect to perceived barriers to RFID (radio frequency identification) transponders being implanted into humans for employee ID. Participants were asked what they believed were the greatest barriers in instituting chip implants for access control in organizations. Participants had six options from which to select. There were significant chi-square analyses reported relative to respondents’ countries and: 1) a perceived barrier of technological issues (χ2 = 11.86, df = 3, p …
On The Security Of Auditing Mechanisms For Secure Cloud Storage, Yong Yu, Lei Niu, Guomin Yang, Yi Mu, Willy Susilo
On The Security Of Auditing Mechanisms For Secure Cloud Storage, Yong Yu, Lei Niu, Guomin Yang, Yi Mu, Willy Susilo
Professor Willy Susilo
Cloud computing is a novel computing model that enables convenient and on-demand access to a shared pool of configurable computing resources. Auditing services are highly essential to make sure that the data is correctly hosted in the cloud. In this paper, we investigate the active adversary attacks in three auditing mechanisms for shared data in the cloud, including two identity privacy-preserving auditing mechanisms called Oruta and Knox, and a distributed storage integrity auditing mechanism. We show that these schemes become insecure when active adversaries are involved in the cloud storage. Specifically, an active adversary can arbitrarily alter the cloud data …
Security Pitfalls Of An Efficient Threshold Proxy Signature Scheme For Mobile Agents, Yong Yu, Yi Mu, Willy Susilo, Man Ho Au
Security Pitfalls Of An Efficient Threshold Proxy Signature Scheme For Mobile Agents, Yong Yu, Yi Mu, Willy Susilo, Man Ho Au
Professor Willy Susilo
A (t,n) threashold proxy signature scheme enables an original signer to delegate his/her signing power to n proxy signers such that any t or more proxy signers can sign messages on behalf of the original signer, but t-1 or less of them cannot produce a valid proxy signature. Based on the RSA cryptosystem, Hong proposed an efficient (t,n) threshold proxy signature for mobile agents. Cai et al. found that the scheme due to Hong is proxy-unprotected , meaning that the original signer can generate a valid proxy signature by himself. However, it is unclear whether the scheme can be used …
The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette
The Future Of National And International Security On The Internet, Maurice Dawson, Marwan Omar, Jonathan Abramson, Dustin Bessette
Maurice Dawson
Hyperconnectivity is a growing trend that is driving cyber security experts to develop new security architectures for multiple platforms such as mobile devices, laptops, and even wearable displays. The futures of national and international security rely on complex countermeasures to ensure that a proper security posture is maintained during this state of hyperconnectivity. To protect these systems from exploitation of vulnerabilities it is essential to understand current and future threats to include the laws that drive their need to be secured. Examined within this chapter are the potential security-related threats with the use of social media, mobile devices, virtual worlds, …