The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a context of users increasingly demanding for the use of technology, organizations are continually challenged to present new strategies to improve their business activities. This forces them to be aligned on frameworks and models that help to adequately relate Information and Communication Technology (ICT) resources to the external and internal activities of the organization. The application of...
With the development of ICT (Information and Communication Technology), computer and the Internet have become indispensable for people's social activities while cyber security threats keep on increase trend. Unfortunately, the current popular security facilities cannot efficiently detect cyber attacks due to a tremendous amount of network traffic needs to be analyzed. In this paper, we focus on DNS...
Securing Internet of Things is a challenge because of its multiple points of vulnerability. In particular, Distributed Denial of Service (DDoS) attacks on IoT devices pose a major security challenge to be addressed. In this paper, we propose a DNS query-based DDoS attack mitigation system using Software-Defined Networking (SDN) to block the network traffic for DDoS attacks. With some features provided...
The European Union (EU) Member States and the European Commission (EC) are investing substantial funds in research and development (R&D) on technologies and innovative solutions for European and international disaster management, risk reduction as well as general crisis preparedness and response. The German Aerospace Center (DLR) has intensively been working in these R&D programs for many...
The objective of our research is to define a requirements model for Adaptive Multi-organizational Systems. Our work considers the functional complexity of contemporary internet-based, multi-organizational systems. Not only the business functions, but also the interactions between the components of such systems are highly dynamic and global. Furthermore, these systems function in extremely uncertain...
With a view of ensuring stable operations of Zaporizhstal Integrated Iron and Steel Works (Ukraine), maintaining fixed assets, enhancing operational reliability of technological facilities, implementing projects and programs, the company's Directorate for Capital Construction and Investment has elaborated system competencies at two levels of project management (external and internal) and tested them...
The paper proposes a method for modeling risk management in multi-project environment. Simulation was conducted and the example was provided in the article.
Network Monitoring Systems (NMS) are an important part of protecting Army and enterprise networks. As governments and corporations grow, the amount of traffic data collected by NMS grows proportionally. To protect users against emerging threats, it is common practice for organizations to maintain a series of custom regular expression (regex) patterns to run on NMS data. However, the growth of network...
Specialists of a number of scientific institutes in this article present examples of successful models of modern press services in institutions in the field of science and education in Russia and research their key methods in work.
Transforming cities into Smart Sustainable cities (SSCs) is rapidly getting global attention as a desired goal for future urban development. Cities are dynamic living organisms that are continuously changing and evolving over time aiming to enhance their economic, social, environmental, and physical structures. At the heart of these structures there are the stakeholders that are treated as end users...
Every year billions of dollars are spent on social development. The heterogeneity of the players and the amounts involved generate a debate about the efficacy of the aid industry considering: first that too much money go to international development; second that very few positive effects are achieved; and finally that the amounts of aid matter less than how it is given. Clearly, there is a need to...
User data has become a backbone of today's ICT services and applications, where various providers compete to provide better services to their users based on a personalized content. However, user data is simultaneously becoming a tempting target for malicious individuals who try to get the data and exploit it for their own financial gain. The necessity for high-quality data loss prevention is obvious...
It discusses the necessity of building college Students' Learning Monitoring and Early Warning System (SLMEWS) as well as points out the importance of parents' participation and assistance considering college students' social environment and background with information acquisition media of digital campus as its method and the school cloud as its technology kernel. It also puts forward a dynamic SLMEWS...
The survey of related works on insider information security (IS) threats is presented. Special attention is paid to works that consider the insiders' behavioral models as it is very up-to-date for behavioral intrusion detection. Three key research directions are defined: 1) the problem analysis in general, including the development of taxonomy for insiders, attacks and countermeasures; 2) study of...
Today numerous information security (IS) incidents in organizations' networks have become not only more sophisticated but also damaging. Hence the systems with proper security services in place to mitigate and promptly respond to IS threats by helping organizations better understand their current network situation, as well as to perform routine work in big IS-related data processing in automatic mode...
The paper presents the work-in-progress in developing since 2016 and using the "Network Security Intelligence" educational and research center (NSIC) in the framework of the NRNU MEPhI's Institute of Cyber Intelligence Systems (ICIS). The NSIC currently consists of two bearing laboratories with Next-Generation Firewall (NGFW) and Data Loss Prevention (DLP) system as their cores respectively...
Child abuse has been one of global issue recently. There are big number of child abuse case in every country in the world. It drives most of country in this world form their private organization to handle the child abuse issue. While running their organization, they also form child abuse policy. Recently, the presence of technology has changed the way people in doing activities. In this paper, we...
Organizations are exposed to various cyber-attacks. When a component is exploited, the overall computed damage is impacted by the number of components the network includes. This work is focuses on estimating the Target Distribution characteristic of an attacked network. According existing security assessment models, Target Distribution is assessed by using ordinal values based on users' intuitive...
This study proposed the appropriation for principle and practice in information technology risk management (ITRM). Due to the various patterns of cyber threat against the advanced information systems and technologies, the well-practiced ITRM is expected from an organization's stakeholders. The well-established principle is the starting point of the practice. The methodology employed in this study...
This research focuses on improving business process worked under workflow simulation. In the business process, there are several properties to be considered such as person, cost, time. The current workflow simulation cannot combine these properties to simulate the situation for business decision making. In this paper, the improving business workflow simulation is proposed by adding the business properties...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.