The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to SCADA (Supervisory Control And Data Acquisition) system constitutes critical infrastructure, the disablement of its components could have a significant influence on the national security. It should be emphasized that the problem to identify and confront threats to the security of SCADA energy systems. A new method to solve this problem is proposed in this paper, based on the construction of...
This paper studies heuristic search-based optimization of service compositions. We have investigated applying Genetic Algorithms (GA) to optimize service-oriented architectures (SOA) in terms of security goals and cost, we help software Engineers to map the optimized service composition to the business process model based on security and cost. Service composition security risk is measured by implementing...
the use of internet increases the chances for attackers to detect the information content during the transmission process between two parties. Steganography is a solution to pass messages between two parties in a secure manner. This work proposes a secure method to hide one or more images simultaneously inside cover image with the same size. This method used genetic algorithm technique to generate...
RGSS-Negotiation is a Repaired Genetic Security Service Negotiation approach. Security as a non-functional requirement for web service is an important trend. This is due to the different levels of security the consumer and the provider demand or supply. In a web service negotiation, researchers negotiate QoS objects (attributes). Negotiating security levels is not addressed so far. In this paper,...
Physical Unclonable Function (PUF) is a new hardware security primitive that exploits the manufacturing variations of integrated circuits. Traditional arbiter PUF is vulnerable to machine learning based modeling attacks due to its linearity. Current mirror PUF uses non-linear current mirror to bring non-linearity into the challenge-response relationship and is claimed resistant to modeling attacks...
Intrusion Detection System is one of the most implementing security solutions in network environments to detect anomalies. The major challenge of this kind of this system is to maximize the detection and accuracy rates and minimize false positive. The well-known genetic algorithm is based on gene reproduction and mutation. Recent research has pointed out that additional information embedded alongside...
Network security situational awareness is a new technology to solve the problem of single defense in recent years, and situation assessment is the most critical step in situational awareness. Because only in real-time and accurately evaluate the security situation of the current network, we can take more targeted defensive measures. This paper aims to improve timeliness and accuracy of the evaluation...
In order to solve the problems of test message being rejected by the network server running the network protocol, a novel method is proposed by introducing the genetic algorithm into the test message generation process. Firstly, under the calculation of distance matrix, alignment of protocol sequence and identification of packet format are accomplished. Secondly, the genetic algorithm is introduced,...
Developers need suitable metric for computer system security. Metrics must adapt to conditions of computer system's environment. Considering the ability of administrator and dynamic environment are the most important conditions of computer system. In this paper, we present a metric for computer system security based on Evolutionary Optimization. Our approach considers a value for ability of administrator...
It is very important to maintain a high level security to ensure safe and trusted communication of information between various organizations. As the growth of computer networks is increasing day by day in modern society, therefore network security is one of the hottest issue to be solved. This paper proposes application of Genetic Algorithm (GA) for network intrusion detection system. Any action that...
Much of the research on security of industrial automation systems has focused on countermeasures such as intrusion detection, certificate management or public key infrastructures. Due to limited resources, countermeasures should be focused to prevent the attacks with highest potential for damage. The impact of an attack can only be determined through a detailed analysis of the interactions of the...
Security is becoming a major concern in computing. New techniques are evolving every day; one of these techniques is Hash Visualization. Hash Visualization uses complex random generated images for security, these images can be used to hide data (watermarking). This proposed new technique improves hash visualization by using genetic algorithms. Genetic algorithms are a search optimization technique...
The purpose of this paper is to illustrate an optimal design procedure for security fixed communication networks that, thanks to Genetic Algorithms (GAs), is capable of reaching the desired goal of preserving the architecture of buildings characterized by installation constrains, such as the historical ones, and of reducing the cost of installation, ensuring a high level of benefit/cost ratio. This...
Visual cryptography is a form of secret sharing requiring only human vision to decrypt a secret image, based on the stacking of seemingly random shadow images, or "shares". The main optimization metrics are pixel expansion and recovered image contrast. Maximization of the latter is crucial, as it determines the quality of the decrypted secret. This paper proposes genetic algorithms to evolve...
In this paper, we propose M-CVaR portfolio selection model under nonlinear transaction costs and minimum trading volumes. We use a quadratic function to approximate origin transaction costs function, set genetic algorithms, and analyse the M-CVaR model by real financial data. A series of numerical experiments shows that the model is reasonable and the algorithm is efficient. Further, we give that...
In order to improve the train energy-saving control strategy, combine the existing energy-saving operation experiences and idea of typical subinterval, adaptive genetic algorithm is adopted to seek for the conversion points of different working conditions making energy consumption minimum under the circumstance of fulfilling the precondition of security, punctuality and driving comfort as well. The...
Moving Target (MT) environments for computer systems provide security through diversity by changing various system properties that are explicitly defined in the computer configuration. Temporal diversity can be achieved by making periodic configuration changes; however in an infrastructure of multiple similarly purposed computers diversity must also be spatial, ensuring multiple computers do not simultaneously...
More and more web applications suffer the presence of cross-site scripting vulnerabilities that could be exploited by attackers to access sensitive information (such as credentials or credit card numbers). Hence proper tests are required to assess the security of web applications. In this paper, we resort to a search based approach for security testing web applications. We take advantage of static...
In this paper a fragile watermarking technique based on Karhunen-Loève transform (KLT) and genetic algorithms (GA) is proposed. To achieve high sensibility to content manipulations, the proposed algorithm slightly modifies the middle-frequency KLT coefficients while maintaining the visual imperceptibility of the watermark (i.e., the average peak signal-to-noise ratio reported was 52.49 dB). It uses...
This paper proposes a novel steganography scheme based on Genetic Algorithm. The novel scheme embeds data by using a mapping function based on Genetic Algorithm in 8×8 blocks on the cover image. The optimal pixel adjustment process is applied after embedding the message. GA and Optimal Pixel Adjustment Process are used to obtain an optimal permutation to reduce the difference error between the cover...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.