Browsing Computing Journal Articles by Subject "080303 Computer System Security"
Now showing items 1-8 of 8
-
Analysis of impersonation attacks on systems using RF fingerprinting and low-end receivers
(Academic Press, 2014-05)Recently, physical layer security commonly known as Radio Frequency (RF) fingerprinting has been proposed to provide an additional layer of security for wireless devices. A unique RF fingerprint can be used to establish ... -
Capture the talent : secondary school education with cyber security competition
(Academy & Industry Research Collaboration Center (AIRCC), 2015-11)Recent advances in computing have caused cyber security to become an increasingly critical issue that affects our everyday life. Both young and old in society are exposed to benefits and dangers that accompany technological ... -
Effects of software security on software development life cycle and related security issues
(International Journal of Computational Intelligence and Information Security (IJCIIS) (Victoria, Australia), 2015-12)Security is a significant issue in the software development life cycle, and may become much more problematic in the future. In the current state there is no simple solution to the software security issue. Moreover, software ... -
Evaluating encryption algorithms for sensitive data using different storage devices
(Hindawi, 2020-05-20)Sensitive data need to be protected from being stolen and read by unauthorized persons regardless of whether the data are stored in hard drives, flash memory, laptops, desktops, and other storage devices. In an enterprise ... -
RF fingerprinting : research opportunities
(Asia Pacific Signal and Information Processing Association (APSIPA), 2015-01)Radio Frequency (RF) fingerprinting aims to de- velop a unique identity for a wireless device that can be used in the same way a biological fingerprint operates, to improve the security and privacy of wireless communication. ... -
Social engineering attacks and countermeasures in the New Zealand banking system : advancing a user-reflective mitigation model
(MDPI (Multidisciplinary Digital Publishing Institute), 2018-05-03)Social engineering attacks are possibly one of the most dangerous forms of security and privacy attacks since they are technically oriented to psychological manipulation and have been growing in frequency with no end in ... -
A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks
(RMIT University, Melbourne, Victoria, Australia, 2017-03-26)This research addresses blackhole and selective forwarding routing attacks, whichare fundamental security attacks on the routing of data in IoT networks. Most IoT devices today,from medical devices to connected vehicles ... -
A trust-based defence scheme for mitigating blackhole and selective forwarding attacks in the RPL routing protocol
(TelSoc : Telecommunications and the Digital Economy, 2018-03-30)The routing protocol for low-power and lossy networks (RPL) has gained prominence as the standard IoT routing protocol. However, it faces like many other routing protocols diverse attacks. Many studies have been proposed ...