This document discusses secure multimedia content protection and sharing. It proposes a technique called LIME (Lineage in Malicious Environment) to identify the party responsible for data leakage. LIME embeds identifying data into each outsourced file through strong watermarking. It then allows an auditor to trace the transmission history and identify the leaker by cross-checking the watermarks. The document outlines the system architecture of LIME, which includes phases for data upload, watermarking, access control, and the lineage method to trace data transmission and identify the leaker. It also reviews related work on digital rights management, watermarking of 3D meshes, fingerprinting for peer-to-peer content distribution, and theoretical frameworks for
The document discusses the concept of "secure pipes", which refers to internet service providers integrating security functions directly into their network infrastructure to filter traffic before it reaches customers. This represents a paradigm shift from the traditional approach where customers were responsible for security after receiving traffic. Secure pipes involve three stages: 1) Filtering to block known bad traffic using signatures, 2) Exposing unknown malicious content through advanced analytics, and 3) Predicting future attacks by analyzing digital breadcrumbs from reconnaissance activities. The key benefits are applying security at internet speeds, gaining visibility from millions of endpoints, and allowing security teams to focus on more sophisticated threats.
The document discusses security risks to networks from both internal and external threats. It notes that internal threats from employees may pose an even greater risk than external hackers. The document advocates for a layered security approach using technologies like firewalls, antivirus software, web filtering, intrusion detection, and AI tools to automate tasks and improve security efficiency while reducing demands on IT staff. It provides examples of real security incidents caused by disgruntled or negligent employees accessing inappropriate content or leaking sensitive information.
Vulnerability management solutions are flawed due to a lack of advanced network endpoint correlation capabilities. This introduces inaccuracies that leave enterprises at high risk. Most solutions only track 3-5 host characteristics for reconciliation over time, but networks experience around 40% "churn", meaning the characteristics change frequently. This limited tracking leads to misleading scan results, an inaccurate security posture view, and vulnerabilities being missed. Advanced reconciliation is needed to properly relate hosts over multiple scans and manage risk levels across time.
Healthcare organizations (HCOs) are facing three major IT security and compliance
challenges. First, IT regulations such as HIPAA are getting stricter and enforcement actions
are becoming more common and costly....
Extending Information Security to Non-Production EnvironmentsLindaWatson19
This paper discusses the threats that non-production environments pose to database security and provides practical advice and multiple options for ensuring data assets remain secure against unauthorized access.
Corporate Data: A Protected Asset or a Ticking Time Bomb? Varonis
Insiders with too much access are the most likely cause of data leakage. Despite a growing number of data breaches occurring under the glare of the public spotlight, 71 percent of employees in a survey conducted by the Ponemon Institute report that they have access to data they should not see, and more than half say that this access is frequent or very frequent.
The findings of this Varonis-sponsored survey are derived from interviews conducted in October 2014 with 2,276 employees in the US, UK, France, and Germany. Respondents included 1,166 IT practitioners and 1,110 end users in organizations ranging in size from dozens to tens of thousands of employees, in a variety of industries including financial services, public sector, health & pharmaceutical, retail, industrial, and technology and software.
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...IRJET Journal
This document discusses a data sharing protocol to minimize security and privacy risks in cloud storage using steganography techniques. It proposes a method that limits trust in a third party/server by delegating some operational loads to the third party while still ensuring data confidentiality. The method uses a layer encryption approach where the data owner performs lower layer encryption and the third party performs top layer encryption. This keeps control over operations with the data owner and helps maintain confidentiality. Steganography is also discussed as a technique to hide secret data within a cover image or file to provide security for data transmission and sharing over the internet.
The document discusses the concept of "secure pipes", which refers to internet service providers integrating security functions directly into their network infrastructure to filter traffic before it reaches customers. This represents a paradigm shift from the traditional approach where customers were responsible for security after receiving traffic. Secure pipes involve three stages: 1) Filtering to block known bad traffic using signatures, 2) Exposing unknown malicious content through advanced analytics, and 3) Predicting future attacks by analyzing digital breadcrumbs from reconnaissance activities. The key benefits are applying security at internet speeds, gaining visibility from millions of endpoints, and allowing security teams to focus on more sophisticated threats.
The document discusses security risks to networks from both internal and external threats. It notes that internal threats from employees may pose an even greater risk than external hackers. The document advocates for a layered security approach using technologies like firewalls, antivirus software, web filtering, intrusion detection, and AI tools to automate tasks and improve security efficiency while reducing demands on IT staff. It provides examples of real security incidents caused by disgruntled or negligent employees accessing inappropriate content or leaking sensitive information.
Vulnerability management solutions are flawed due to a lack of advanced network endpoint correlation capabilities. This introduces inaccuracies that leave enterprises at high risk. Most solutions only track 3-5 host characteristics for reconciliation over time, but networks experience around 40% "churn", meaning the characteristics change frequently. This limited tracking leads to misleading scan results, an inaccurate security posture view, and vulnerabilities being missed. Advanced reconciliation is needed to properly relate hosts over multiple scans and manage risk levels across time.
Healthcare organizations (HCOs) are facing three major IT security and compliance
challenges. First, IT regulations such as HIPAA are getting stricter and enforcement actions
are becoming more common and costly....
Extending Information Security to Non-Production EnvironmentsLindaWatson19
This paper discusses the threats that non-production environments pose to database security and provides practical advice and multiple options for ensuring data assets remain secure against unauthorized access.
Corporate Data: A Protected Asset or a Ticking Time Bomb? Varonis
Insiders with too much access are the most likely cause of data leakage. Despite a growing number of data breaches occurring under the glare of the public spotlight, 71 percent of employees in a survey conducted by the Ponemon Institute report that they have access to data they should not see, and more than half say that this access is frequent or very frequent.
The findings of this Varonis-sponsored survey are derived from interviews conducted in October 2014 with 2,276 employees in the US, UK, France, and Germany. Respondents included 1,166 IT practitioners and 1,110 end users in organizations ranging in size from dozens to tens of thousands of employees, in a variety of industries including financial services, public sector, health & pharmaceutical, retail, industrial, and technology and software.
IRJET- A Data Sharing Protocol to Minimize Security and Privacy Risks in Clou...IRJET Journal
This document discusses a data sharing protocol to minimize security and privacy risks in cloud storage using steganography techniques. It proposes a method that limits trust in a third party/server by delegating some operational loads to the third party while still ensuring data confidentiality. The method uses a layer encryption approach where the data owner performs lower layer encryption and the third party performs top layer encryption. This keeps control over operations with the data owner and helps maintain confidentiality. Steganography is also discussed as a technique to hide secret data within a cover image or file to provide security for data transmission and sharing over the internet.
ATLAS is a global threat analysis network operated by Arbor Networks that collects network traffic data from over 250 participating carriers and enterprises. This data is analyzed by Arbor's security researchers to produce actionable threat intelligence on malware, phishing, botnets, and DDoS attacks. Participating in ATLAS provides benefits like improved network security through more proactive threat mitigation, reduced remediation efforts, and enhanced knowledge for security analysts. It also lessens workload on network infrastructure by offloading darknet traffic to sensors. Enterprises should consider carriers that participate in ATLAS for more reliable network services and security protections.
How to protect privacy sensitive data that is collected to control the corona...Ulf Mattsson
In Singapore, the Government launched an app using short-distance Bluetooth signals to connect one phone using the app with another user who is close by. It stores detailed records on a user's phone for 21 days decrypt the data if there is a public health risk related to an individual's movements.
China used a similar method to track a person's health status and to control movement in cities with high numbers of coronavirus cases. Individuals had to use the app and share their status to be able to access public transportation.
The keys to addressing privacy concerns about high-tech surveillance by the state is de-identifying the data and giving individuals control over their own data. Personal details that may reveal your identity such as a user's name should not be collected or should be protected with access to be granted for only specific health purposes, and data should be deleted after its specific use is no longer needed.
We will discuss how to protect privacy sensitive data that is collected to control the coronavirus outbreak.
IRJET- Honeywords: A New Approach for Enhancing SecurityIRJET Journal
This document summarizes a research paper on honeywords, a new approach for enhancing password security. Honeywords involve storing fake passwords (honeywords) along with the real password for each user account. If an attacker tries to login with a honeyword, it triggers an alarm. The document outlines the proposed system, which generates a unique honey index for each account during registration. It stores the hash of the real password along with the correct honey index. If an attacker enters an incorrect password after 3 attempts, the account is blocked. The system creates honeywords after successful login. It also discusses related work and concludes that honeywords make password cracking detectable and more difficult.
The document discusses ethical hacking. It begins by defining hacking and different types of hackers, including white hat, black hat, and grey hat hackers. It then defines ethical hacking as hacking done with consent and for beneficial purposes, such as identifying security vulnerabilities. The document outlines the techniques used in ethical hacking, including information gathering, vulnerability scanning, exploitation, and analysis. It discusses the importance of ethical hacking for organizations and the code of conduct ethical hackers follow. Overall, the document provides an overview of ethical hacking, its purpose, and the methods used.
The document summarizes a data breach that occurred at Target Corporation between November and December 2013. Hackers installed malware on Target's point-of-sale systems that stole payment card information for over 110 million customers. This led to fraudulent purchases and significant costs for Target, including a $1 billion estimated total cost, 25% drop in stock price, resignation of the CEO, and closure of some stores. The document outlines the nature of the attack, malware used, response by Target, and implications for digital security leadership.
Risks related to total visibility and control over their data (unstructued and semi-structured), ensuring that only the right users have access to the right data at all times
The document discusses 10 unique security problems faced by IT organizations. It covers issues such as conflicting priorities between security and productivity, system penetration threats from poorly secured systems, realities of the open Internet including lack of inherent protections, security challenges from portable devices and media, risks of centralized and decentralized systems, and issues around employee turnover. The document provides examples and recommendations for addressing each security problem.
Anomaly Threat Detection System using User and Role-Based Profile Assessmentijtsrd
In network security the organizations are ever-growing to identify insider threats. Those who have authorized access to sensitive organizational data are placed in a position of power that could well be abused and could cause significant damage to an organization. Traditional intrusion detection systems are neither designed nor capable of identifying those who act maliciously within an organization. We describe an automated system that is capable of detecting insider threats within an organization. We define a tree-structure profiling approach that incorporates the details of activities conducted by each user and each job role and then use this to obtain a consistent representation of features that provide a rich description of the users behavior. Deviation can be assessed based on the amount of variance that each user exhibits across multiple attributes, compared against their peers. We have performed experimentation using that the system can identify anomalous behavior that may be indicative of a potential threat. We also show how our detection system can be combined with visual analytics tools to support further investigation by an analyst. U. Indumathy | M. Nivedha | Mrs. K. Alice"Anomaly Threat Detection System using User and Role-Based Profile Assessment" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd10956.pdf http://www.ijtsrd.com/engineering/computer-engineering/10956/anomaly-threat-detection-system-using-user-and-role-based-profile-assessment/u-indumathy
WeSecure Data Security Congres: How to build a data governance frameworkWeSecure
Cyril Simonnet, Sales Director Varonis, explains all the ins and outs about how to build a Data Governance framework. For more information about Varonis, check: https://www.wesecure.nl/producten/varonis/
Improve Cybersecurity Education Or Awareness TrainingTriskele Labs
With the digitalisation of education, organisations need to be prepared to meet a new set of cybersecurity challenges that may seem unfamiliar. The key, here, is to not ignore these risks but take action; even if it means turning to experts for support.
Follow Us : https://triskelelabs.com
Varonis Systems works in previously never solved but important area of security - the high risk of access and usage of our unstructured data. Windows / Unix / Linux fileservers, Microsoft Exchange, Microsoft Sharepoint, NAS and so on holds millions of PDF's, PPT's, DOC's, XLS's and other unstructured information which without Varonis Systems DatAdvantage is hard to manage.
Keep Student information protected while improving servicesCloudMask inc.
Increasingly, we are seeing instances of cloud use in universities and institutions of higher learning moving their applications to the cloud. Although the rate of movement is somewhat lower than the broader market, the trend is clearly visible. Universities are moving to the cloud for a large number of applications, including student engagement, learning, research, inter-university collaboration and routine management of university operations.
Fusion of data from multiple sources is generating new information from existing data. Now users can access any information from inside or outside of the organization very easily. It helps to increase the user productivity and knowledge shared within the organization. But this leads to a new area of network security threat, “Inside Threat”. Now users can share critical information of organization to outside the organization if he/she has access to the information. The current network security tool cannot prevent the new threat. In this paper, we address this issue by “Building real time anomaly detection system based on users’ current behavior and previous behavior”.
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...EMC
This white paper presents Beehive, a novel system that attacks the problem of automatically mining and extracting knowledge from the dirty log data produced by a wide variety of security products in a large enterprise.
Is your infrastructure holding you back?Gabe Akisanmi
This ebook will help you connect the dots between
today’s biggest business opportunities and the specific
technology required to seize them. You’ll get the facts
you need to identify where current components may
be falling short—and how the right investments in infrastructure
can lead to better business outcomes while
strengthening your role as a strategic consultant within
your organization.
This course focuses on SCADA/ ICS systems. The title of this course is: Advanced Threat Detection in ICS – SCADA Environments.
In this course we take a look at the effectiveness of honeypots within a SCADA/ ICS context. A honeypot typically consists of data, or a network site that appears to be part of the organization’s network, but is actually isolated and monitored, and which seems to contain information or a resource of value to attackers.
The user requirements of a new system for Railway reservation system may include:
1.Easy-to-use Interface: The new system should have a simple and intuitive user interface that allows users to quickly and easily access the web application and service providers to efficiently respond to requests.
2.Comprehensive Coverage: The new system should have an extensive coverage area that ensures drivers in all locations have access to timely and reliable assistance.
3.Integration with Modern Technologies: The new system should be fully integrated with modern communication channels and technologies, such as mobile devices and GPS, to allow for efficient and accurate communication between drivers and service providers.
4.Fast Response Times: The new system should ensure that service providers can quickly and efficiently respond to service requests, minimizing wait times for drivers in need of assistance.
5.Reliable Service: The new system should provide drivers with access to reliable and trustworthy service providers, ensuring that they receive high-quality service and repairs.
6.24/7 Availability: The new system should be available 24/7, ensuring that drivers can request assistance at any time of the day or night.
7.Transparent Pricing: The new system should provide transparent and fair pricing for all services, ensuring that drivers know what to expect and are not subject to unexpected or unreasonable charges.
|
By meeting these user requirements, a new system for On Road Vehicle Breakdown Assistance can provide drivers with a reliable, efficient, and easy-to-use platform for accessing assistance and ensuring their safety on the road.
The document describes a privacy-preserving method for detecting inadvertent leaks of sensitive data in network traffic. The method allows an organization to outsource detection to a provider without revealing the actual sensitive data. It involves the organization computing digests of the sensitive data and sharing a sample with the provider. The provider searches traffic for matches and returns potential leaks. The organization then determines if any are true leaks, protecting the privacy of the sensitive data from the provider. The method was implemented and evaluated on real datasets, showing accurate detection while preserving privacy.
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACYIRJET Journal
This document discusses methods for enhancing data privacy through crypto clustering of heterogeneous and sensitive data. It first reviews existing literature on privacy-preserving techniques like local differential privacy and differential privacy-based clustering. It then proposes a method that uses cryptographic implementations based on sensitivity prediction and local differential privacy to automatically protect mixed data according to type and predicted sensitivity. Sensitive data is clustered and secured using these techniques to enhance privacy while maintaining data utility.
In this work we highlighted some of the concepts of data privacy, techniques used in data privacy, and some techniques used in data privacy in the cloud plus some new research trends.
ATLAS is a global threat analysis network operated by Arbor Networks that collects network traffic data from over 250 participating carriers and enterprises. This data is analyzed by Arbor's security researchers to produce actionable threat intelligence on malware, phishing, botnets, and DDoS attacks. Participating in ATLAS provides benefits like improved network security through more proactive threat mitigation, reduced remediation efforts, and enhanced knowledge for security analysts. It also lessens workload on network infrastructure by offloading darknet traffic to sensors. Enterprises should consider carriers that participate in ATLAS for more reliable network services and security protections.
How to protect privacy sensitive data that is collected to control the corona...Ulf Mattsson
In Singapore, the Government launched an app using short-distance Bluetooth signals to connect one phone using the app with another user who is close by. It stores detailed records on a user's phone for 21 days decrypt the data if there is a public health risk related to an individual's movements.
China used a similar method to track a person's health status and to control movement in cities with high numbers of coronavirus cases. Individuals had to use the app and share their status to be able to access public transportation.
The keys to addressing privacy concerns about high-tech surveillance by the state is de-identifying the data and giving individuals control over their own data. Personal details that may reveal your identity such as a user's name should not be collected or should be protected with access to be granted for only specific health purposes, and data should be deleted after its specific use is no longer needed.
We will discuss how to protect privacy sensitive data that is collected to control the coronavirus outbreak.
IRJET- Honeywords: A New Approach for Enhancing SecurityIRJET Journal
This document summarizes a research paper on honeywords, a new approach for enhancing password security. Honeywords involve storing fake passwords (honeywords) along with the real password for each user account. If an attacker tries to login with a honeyword, it triggers an alarm. The document outlines the proposed system, which generates a unique honey index for each account during registration. It stores the hash of the real password along with the correct honey index. If an attacker enters an incorrect password after 3 attempts, the account is blocked. The system creates honeywords after successful login. It also discusses related work and concludes that honeywords make password cracking detectable and more difficult.
The document discusses ethical hacking. It begins by defining hacking and different types of hackers, including white hat, black hat, and grey hat hackers. It then defines ethical hacking as hacking done with consent and for beneficial purposes, such as identifying security vulnerabilities. The document outlines the techniques used in ethical hacking, including information gathering, vulnerability scanning, exploitation, and analysis. It discusses the importance of ethical hacking for organizations and the code of conduct ethical hackers follow. Overall, the document provides an overview of ethical hacking, its purpose, and the methods used.
The document summarizes a data breach that occurred at Target Corporation between November and December 2013. Hackers installed malware on Target's point-of-sale systems that stole payment card information for over 110 million customers. This led to fraudulent purchases and significant costs for Target, including a $1 billion estimated total cost, 25% drop in stock price, resignation of the CEO, and closure of some stores. The document outlines the nature of the attack, malware used, response by Target, and implications for digital security leadership.
Risks related to total visibility and control over their data (unstructued and semi-structured), ensuring that only the right users have access to the right data at all times
The document discusses 10 unique security problems faced by IT organizations. It covers issues such as conflicting priorities between security and productivity, system penetration threats from poorly secured systems, realities of the open Internet including lack of inherent protections, security challenges from portable devices and media, risks of centralized and decentralized systems, and issues around employee turnover. The document provides examples and recommendations for addressing each security problem.
Anomaly Threat Detection System using User and Role-Based Profile Assessmentijtsrd
In network security the organizations are ever-growing to identify insider threats. Those who have authorized access to sensitive organizational data are placed in a position of power that could well be abused and could cause significant damage to an organization. Traditional intrusion detection systems are neither designed nor capable of identifying those who act maliciously within an organization. We describe an automated system that is capable of detecting insider threats within an organization. We define a tree-structure profiling approach that incorporates the details of activities conducted by each user and each job role and then use this to obtain a consistent representation of features that provide a rich description of the users behavior. Deviation can be assessed based on the amount of variance that each user exhibits across multiple attributes, compared against their peers. We have performed experimentation using that the system can identify anomalous behavior that may be indicative of a potential threat. We also show how our detection system can be combined with visual analytics tools to support further investigation by an analyst. U. Indumathy | M. Nivedha | Mrs. K. Alice"Anomaly Threat Detection System using User and Role-Based Profile Assessment" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd10956.pdf http://www.ijtsrd.com/engineering/computer-engineering/10956/anomaly-threat-detection-system-using-user-and-role-based-profile-assessment/u-indumathy
WeSecure Data Security Congres: How to build a data governance frameworkWeSecure
Cyril Simonnet, Sales Director Varonis, explains all the ins and outs about how to build a Data Governance framework. For more information about Varonis, check: https://www.wesecure.nl/producten/varonis/
Improve Cybersecurity Education Or Awareness TrainingTriskele Labs
With the digitalisation of education, organisations need to be prepared to meet a new set of cybersecurity challenges that may seem unfamiliar. The key, here, is to not ignore these risks but take action; even if it means turning to experts for support.
Follow Us : https://triskelelabs.com
Varonis Systems works in previously never solved but important area of security - the high risk of access and usage of our unstructured data. Windows / Unix / Linux fileservers, Microsoft Exchange, Microsoft Sharepoint, NAS and so on holds millions of PDF's, PPT's, DOC's, XLS's and other unstructured information which without Varonis Systems DatAdvantage is hard to manage.
Keep Student information protected while improving servicesCloudMask inc.
Increasingly, we are seeing instances of cloud use in universities and institutions of higher learning moving their applications to the cloud. Although the rate of movement is somewhat lower than the broader market, the trend is clearly visible. Universities are moving to the cloud for a large number of applications, including student engagement, learning, research, inter-university collaboration and routine management of university operations.
Fusion of data from multiple sources is generating new information from existing data. Now users can access any information from inside or outside of the organization very easily. It helps to increase the user productivity and knowledge shared within the organization. But this leads to a new area of network security threat, “Inside Threat”. Now users can share critical information of organization to outside the organization if he/she has access to the information. The current network security tool cannot prevent the new threat. In this paper, we address this issue by “Building real time anomaly detection system based on users’ current behavior and previous behavior”.
Beehive: Large-Scale Log Analysis for Detecting Suspicious Activity in Enterp...EMC
This white paper presents Beehive, a novel system that attacks the problem of automatically mining and extracting knowledge from the dirty log data produced by a wide variety of security products in a large enterprise.
Is your infrastructure holding you back?Gabe Akisanmi
This ebook will help you connect the dots between
today’s biggest business opportunities and the specific
technology required to seize them. You’ll get the facts
you need to identify where current components may
be falling short—and how the right investments in infrastructure
can lead to better business outcomes while
strengthening your role as a strategic consultant within
your organization.
This course focuses on SCADA/ ICS systems. The title of this course is: Advanced Threat Detection in ICS – SCADA Environments.
In this course we take a look at the effectiveness of honeypots within a SCADA/ ICS context. A honeypot typically consists of data, or a network site that appears to be part of the organization’s network, but is actually isolated and monitored, and which seems to contain information or a resource of value to attackers.
The user requirements of a new system for Railway reservation system may include:
1.Easy-to-use Interface: The new system should have a simple and intuitive user interface that allows users to quickly and easily access the web application and service providers to efficiently respond to requests.
2.Comprehensive Coverage: The new system should have an extensive coverage area that ensures drivers in all locations have access to timely and reliable assistance.
3.Integration with Modern Technologies: The new system should be fully integrated with modern communication channels and technologies, such as mobile devices and GPS, to allow for efficient and accurate communication between drivers and service providers.
4.Fast Response Times: The new system should ensure that service providers can quickly and efficiently respond to service requests, minimizing wait times for drivers in need of assistance.
5.Reliable Service: The new system should provide drivers with access to reliable and trustworthy service providers, ensuring that they receive high-quality service and repairs.
6.24/7 Availability: The new system should be available 24/7, ensuring that drivers can request assistance at any time of the day or night.
7.Transparent Pricing: The new system should provide transparent and fair pricing for all services, ensuring that drivers know what to expect and are not subject to unexpected or unreasonable charges.
|
By meeting these user requirements, a new system for On Road Vehicle Breakdown Assistance can provide drivers with a reliable, efficient, and easy-to-use platform for accessing assistance and ensuring their safety on the road.
The document describes a privacy-preserving method for detecting inadvertent leaks of sensitive data in network traffic. The method allows an organization to outsource detection to a provider without revealing the actual sensitive data. It involves the organization computing digests of the sensitive data and sharing a sample with the provider. The provider searches traffic for matches and returns potential leaks. The organization then determines if any are true leaks, protecting the privacy of the sensitive data from the provider. The method was implemented and evaluated on real datasets, showing accurate detection while preserving privacy.
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACYIRJET Journal
This document discusses methods for enhancing data privacy through crypto clustering of heterogeneous and sensitive data. It first reviews existing literature on privacy-preserving techniques like local differential privacy and differential privacy-based clustering. It then proposes a method that uses cryptographic implementations based on sensitivity prediction and local differential privacy to automatically protect mixed data according to type and predicted sensitivity. Sensitive data is clustered and secured using these techniques to enhance privacy while maintaining data utility.
In this work we highlighted some of the concepts of data privacy, techniques used in data privacy, and some techniques used in data privacy in the cloud plus some new research trends.
Doctor’s Appointment and E-Prescription Access Management SystemIRJET Journal
This document proposes a doctor's appointment and e-prescription access management system. It discusses how current electronic health systems have issues with privacy and security of patient data. The proposed system integrates e-patient records, e-prescriptions, smart cards, fingerprint identification, and applies proxy signatures and group signatures to provide security. It also implements steganography and AES encryption to securely transmit prescriptions only to authorized pharmacies. The system aims to efficiently manage healthcare resources while maintaining security and privacy of patient medical information.
This document discusses a data leakage detection system. It begins with an abstract discussing how data leakage detection systems can securely prevent data leakage. It then discusses how a main server passes data to client servers, and how the main server records IP and MAC addresses to detect if data leakage occurs from a particular client, identifying that client as the "guilt agent". The introduction provides more details on the motivation for detecting data leakage when sensitive data is shared with third parties. It discusses how perturbation techniques can modify data but may not always be suitable. It then describes how the proposed system uses unobtrusive techniques to detect leakage by analyzing which agents are more likely to be responsible for leaked data being discovered, without modifying the original data. The document
An Improved Method for Preventing Data Leakage in an OrganizationIJERA Editor
Data is one of the most important assets an organisation has since it denes each organisations unique- ness.It
includes data on members and prospects, their inter- ests and purchases, your events, speakers, your content,
social media, press, your staff, budget, strategic plan, and much more. As organizations open their doors to
employees, part- ners, customers and suppliers to provide deeper access to sensitive information, the risk
sassociated with business increase. Now, more than ever, within creasing threats of cyber terrorism, cor- porate
governance issues, fraud, and identity theft, the need for securing corporate information has become paramount.
Informa- tion theft is not just about external hackers and unauthorized external users stealing your data, it is also
about managing internal employees and even contractors who may be working within your organization for
short periods of time. Adding to the challenge of securing information is the increasing push for corporate
governance and adherence to legislative or regulatory requirements. Failure to comply and provide privacy,
audit and internal controls could result in penalties ranging from large nes to jail terms. Non-compliance can
result in not only potential implications for executives, but also possible threats to the viability of a corporation.
Insiders too represent a sign cant risk to data security. The task of detecting malicious insiders is very
challenging as the methods of deception become more and more sophisticated. There are various solutions
present to avoid data leakage. Data leakage detection, prevention (DLPM) and monitoring solutions became an
inherent component of the organizations security suite.DLP solutions monitors sensitive data when at rest, in
motion, or in use and enforce the organizational data protection policy.These solutions focus mainly on the data
and its sensitivity level, and on preventing it from reaching an unauthorized person. They ignore the fact that an
insider is gradually exposed to more and more sensitive data,to which she is authorized to access. Such data
may cause great damage to the organization when leaked or misused. Data can be leaked via emails, instant
messaging, le transfer etc. This research is focusing on email data leakage monitoring, detection and
prevention. It is proposed to be carried out in two phases: leakage detection through mining and prevention
through encryption of email content.
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET Journal
This document discusses data leakage prevention (DLP) systems and approaches to avoid data breaches in organizations. It begins with an abstract that outlines how sensitive data can be lost through unauthorized access or transfer. The introduction then discusses the need for DLP to control and monitor data access and usage. Key challenges for DLP implementations are also reviewed, such as protecting information, reducing unauthorized data transfers, and identifying internal and external threats. The document concludes with recommendations for future research on DLP, including using deep learning techniques to improve insider threat detection and monitoring encrypted communication channels.
Module 02 Performance Risk-based Analytics With all the advancemIlonaThornburg83
Module 02 Performance Risk-based Analytics
With all the advancements in technology and encryption levels, some methods are faster or slower than others. In most cases a cybersecurity professional must weigh cost, performance, and security. Risk is a powerful tool used by all cybersecurity professionals to assist in making these decisions, and in influencing appropriate stakeholders by providing appropriate information with regard to these three elements.
Risk analysis or risk base analytics helps determine the level of risk to an organization. The first step in this process is to determine the sensitivity of the data being processed. The example below is a common data classification for many organizations; however, depending on how the data will be used, these data fields may vary due to classification levels.
· Public: Data available to the general public and approved for distribution outside the organization.
· Examples: press releases, directory information (not subject to a government regulations or blocks), product catalogs, application and request forms, and other general information that is openly shared. The type of information an organization would choose to post on its website offers a good example of Public data.
· Internal: Data necessary for the operation of the business and generally available to all internal users, users of that particular customer, and potentially interested third-parties if appropriate and when authorized.
· Examples: Some memos, correspondence, and meeting minutes; contact lists that contain information that is not publicly available; and procedural documentation that should remain internal.
· Confidential: Data generally not made available outside the organization and the unauthorized access, use, disclosure, duplication, modification, or destruction of which could adversely impact the organization and/or customers. All confidential information is sensitive in nature and must be restricted to those with a legitimate business need to know.
· Examples:
· Information covered by the Family Educational Rights and Privacy Act (FERPA), which requires protection of records for current and former students. This includes pictures of students kept for official purposes.
· Personally identifiable information entrusted to the organization’s care that is not restricted use data, such as information regarding applicants, donors, potential donors, or competitive marketing research data.
· Information covered by the Gramm-Leach-Bliley Act (GLB), which requires protection of certain financial records.
· Individual employment information, including salary, benefits and performance appraisals for current, former, and prospective employees.
· Legally privileged information.
· Information that is the subject of a confidentiality agreement.
· Restricted: Data that MUST be specifically protected via various access, confidentiality, integrity and/or non-repudiation controls in order to comply with legislative, regulatory, con ...
IRJET- Proficient Public Substantiation of Data Veracity for Cloud Storage th...IRJET Journal
This document proposes a system for securely storing data in the cloud using dual protection. The system splits data files into multiple parts and stores each part in different cloud server locations. It also encrypts each split file before storage. This makes the data difficult for attackers to access, as they would need to decrypt the files and recombine parts from different locations. The system generates keys for auditing and verification. It allows file sharing and editing with owner permission. When users download files, they must provide the correct security key, which is verified before decrypting and recombining the file. The dual protection of splitting and encrypting files improves security for cloud data storage.
IRJET-An Algorithmic Approach for Remote Data Uploading and Integrity Checkin...IRJET Journal
This document proposes an algorithm called ID-PUIC for remote data uploading and integrity checking in public clouds. It aims to address security issues when clients store sensitive data in public clouds, which they do not fully control. The proposed system uses a proxy to upload client data and perform remote integrity checks with the public cloud server. It introduces a protocol for the proxy to generate tags for file blocks and upload them along with the data for integrity verification. The ID-PUIC algorithm is more efficient for integrity checking than existing solutions as it ignores certificate management and uses bilinear pairings for security. The document outlines the system model, data flow, modules including key generation, tag generation and proofs to check integrity remotely between the client and public cloud server
Survey on Medical Data Sharing Systems with NTRUIRJET Journal
The article discusses international issues. It mentions that globalization has increased economic interdependence between nations while also raising tensions over immigration and trade. Solutions will require cooperation and compromise and a recognition that isolationism is not a viable strategy in an interconnected world.
The document discusses information security and analyzes its importance. It describes key aspects of information security like confidentiality, integrity and availability. It also outlines some common threats to information security such as computer viruses, theft, sabotage and vandalism. The document then analyzes some challenges to effective information security, including employees being fooled by scams, issues with authentication, and the growing threat of phishing. It emphasizes the importance of addressing security concerns to build trust with customers and gain a competitive advantage.
IRJET- Detecting Data Leakage and Implementing Security Measures in Cloud Com...IRJET Journal
This document proposes a methodology called DROPS (Division and Replication of Data in the Cloud for Optimal Performance and Security) to address security and performance issues with data stored in the cloud. The DROPS methodology divides files stored in the cloud into multiple fragments and replicates each fragment, storing the fragments across different nodes. This makes it difficult for attackers to access full files even if they breach individual nodes. The document also discusses existing approaches like watermarking and introducing fake data, and their limitations. It proposes using a technique called T-Coloring to separate nodes storing fragments and increase the distance between fragments to block intruders.
IRJET - Identifying Information Relocate with Reliable Estimation and Sec...IRJET Journal
This document summarizes a research paper that proposes a method for ensuring data integrity and privacy when data is stored on cloud computing systems. The method uses blockchain techniques and distributed verification to provide redundancy and guarantee data reliability. It allows both data owners and public verifiers to check data integrity without downloading the entire dataset. The technique utilizes homomorphic tokens and ring signatures to enable auditing while preventing privacy leaks about user identities or data contents. Prior works on remote data integrity lacked either public auditing or support for dynamic data operations, but the proposed method achieves both.
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at RiskClearDATACloud
Healthcare PHI breaches resulting from technology vendor mistakes and misunderstandings have spiked over the past 2-3 years. Litigation, fines, remediation, and restitution can reach into the millions of dollars. This presentation will cover five common, but frequently overlooked, ways that technology vendors put their healthcare customer's PHI at risk. Just as importantly, it provides real world examples and pragmatic recommendations for addressing these issues to significantly reduce risk to you and your customers.
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...IRJET Journal
1. The document proposes using artificial intelligence to assess security risks on social media by detecting suspicious activity and malicious URLs.
2. It discusses drawbacks of existing intrusion detection systems, including complexity and vulnerabilities.
3. The proposed system would use AI techniques to automate intrusion detection, identify unknown threats, and learn over time to handle large volumes of data.
Securing Liaison-Less Publisher/Subscriber Systems using Identity Based Encr...IRJET Journal
This document proposes a novel approach to provide authentication and confidentiality in a broker-less content-based publish/subscribe system. It adapts pairing-based cryptography techniques to ensure authentication of publishers and subscribers as well as confidentiality of events. It also describes an algorithm for clustering subscribers according to their subscriptions to provide a level of protection for subscription confidentiality. The proposed approach provides fine-grained key management and encryption/decryption and routing costs that scale with the number of subscribed attributes. It evaluates the performance of the cryptographic primitives and the overhead of maintaining the publish/subscribe overlay and distributing encrypted events.
Similar to Secure Multimedia Content Protection and Sharing (20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
1) The document discusses the Sungal Tunnel project in Jammu and Kashmir, India, which is being constructed using the New Austrian Tunneling Method (NATM).
2) NATM involves continuous monitoring during construction to adapt to changing ground conditions, and makes extensive use of shotcrete for temporary tunnel support.
3) The methodology section outlines the systematic geotechnical design process for tunnels according to Austrian guidelines, and describes the various steps of NATM tunnel construction including initial and secondary tunnel support.
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
This study examines the effect of response reduction factors (R factors) on reinforced concrete (RC) framed structures through nonlinear dynamic analysis. Three RC frame models with varying heights (4, 8, and 12 stories) were analyzed in ETABS software under different R factors ranging from 1 to 5. The results showed that displacement increased as the R factor decreased, indicating less linear behavior for lower R factors. Drift also decreased proportionally with increasing R factors from 1 to 5. Shear forces in the frames decreased with higher R factors. In general, R factors of 3 to 5 produced more satisfactory performance with less displacement and drift. The displacement variations between different building heights were consistent at different R factors. This study evaluated how R factors influence
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
This study compares the use of Stark Steel and TMT Steel as reinforcement materials in a two-way reinforced concrete slab. Mechanical testing is conducted to determine the tensile strength, yield strength, and other properties of each material. A two-way slab design adhering to codes and standards is executed with both materials. The performance is analyzed in terms of deflection, stability under loads, and displacement. Cost analyses accounting for material, durability, maintenance, and life cycle costs are also conducted. The findings provide insights into the economic and structural implications of each material for reinforcement selection and recommendations on the most suitable material based on the analysis.
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
This document discusses a study analyzing the effect of camber, position of camber, and angle of attack on the aerodynamic characteristics of airfoils. Sixteen modified asymmetric NACA airfoils were analyzed using computational fluid dynamics (CFD) by varying the camber, camber position, and angle of attack. The results showed the relationship between these parameters and the lift coefficient, drag coefficient, and lift to drag ratio. This provides insight into how changes in airfoil geometry impact aerodynamic performance.
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
This document reviews the progress and challenges of aluminum-based metal matrix composites (MMCs), focusing on their fabrication processes and applications. It discusses how various aluminum MMCs have been developed using reinforcements like borides, carbides, oxides, and nitrides to improve mechanical and wear properties. These composites have gained prominence for their lightweight, high-strength and corrosion resistance properties. The document also examines recent advancements in fabrication techniques for aluminum MMCs and their growing applications in industries such as aerospace and automotive. However, it notes that challenges remain around issues like improper mixing of reinforcements and reducing reinforcement agglomeration.
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
This document discusses research on using graph neural networks (GNNs) for dynamic optimization of public transportation networks in real-time. GNNs represent transit networks as graphs with nodes as stops and edges as connections. The GNN model aims to optimize networks using real-time data on vehicle locations, arrival times, and passenger loads. This helps increase mobility, decrease traffic, and improve efficiency. The system continuously trains and infers to adapt to changing transit conditions, providing decision support tools. While research has focused on performance, more work is needed on security, socio-economic impacts, contextual generalization of models, continuous learning approaches, and effective real-time visualization.
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
This document summarizes a research project that aims to compare the structural performance of conventional slab and grid slab systems in multi-story buildings using ETABS software. The study will analyze both symmetric and asymmetric building models under various loading conditions. Parameters like deflections, moments, shears, and stresses will be examined to evaluate the structural effectiveness of each slab type. The results will provide insights into the comparative behavior of conventional and grid slabs to help engineers and architects select appropriate slab systems based on building layouts and design requirements.
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
This document summarizes and reviews a research paper on the seismic response of reinforced concrete (RC) structures with plan and vertical irregularities, with and without infill walls. It discusses how infill walls can improve or reduce the seismic performance of RC buildings, depending on factors like wall layout, height distribution, connection to the frame, and relative stiffness of walls and frames. The reviewed research paper analyzes the behavior of infill walls, effects of vertical irregularities, and seismic performance of high-rise structures under linear static and dynamic analysis. It studies response characteristics like story drift, deflection and shear. The document also provides literature on similar research investigating the effects of infill walls, soft stories, plan irregularities, and different
This document provides a review of machine learning techniques used in Advanced Driver Assistance Systems (ADAS). It begins with an abstract that summarizes key applications of machine learning in ADAS, including object detection, recognition, and decision-making. The introduction discusses the integration of machine learning in ADAS and how it is transforming vehicle safety. The literature review then examines several research papers on topics like lightweight deep learning models for object detection and lane detection models using image processing. It concludes by discussing challenges and opportunities in the field, such as improving algorithm robustness and adaptability.
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
The document analyzes temperature and precipitation trends in Asosa District, Benishangul Gumuz Region, Ethiopia from 1993 to 2022 based on data from the local meteorological station. The results show:
1) The average maximum and minimum annual temperatures have generally decreased over time, with maximum temperatures decreasing by a factor of -0.0341 and minimum by -0.0152.
2) Mann-Kendall tests found the decreasing temperature trends to be statistically significant for annual maximum temperatures but not for annual minimum temperatures.
3) Annual precipitation in Asosa District showed a statistically significant increasing trend.
The conclusions recommend development planners account for rising summer precipitation and declining temperatures in
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
This document discusses the design and analysis of pre-engineered building (PEB) framed structures using STAAD Pro software. It provides an overview of PEBs, including that they are designed off-site with building trusses and beams produced in a factory. STAAD Pro is identified as a key tool for modeling, analyzing, and designing PEBs to ensure their performance and safety under various load scenarios. The document outlines modeling structural parts in STAAD Pro, evaluating structural reactions, assigning loads, and following international design codes and standards. In summary, STAAD Pro is used to design and analyze PEB framed structures to ensure safety and code compliance.
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
This document provides a review of research on innovative fiber integration methods for reinforcing concrete structures. It discusses studies that have explored using carbon fiber reinforced polymer (CFRP) composites with recycled plastic aggregates to develop more sustainable strengthening techniques. It also examines using ultra-high performance fiber reinforced concrete to improve shear strength in beams. Additional topics covered include the dynamic responses of FRP-strengthened beams under static and impact loads, and the performance of preloaded CFRP-strengthened fiber reinforced concrete beams. The review highlights the potential of fiber composites to enable more sustainable and resilient construction practices.
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
This document summarizes a survey on securing patient healthcare data in cloud-based systems. It discusses using technologies like facial recognition, smart cards, and cloud computing combined with strong encryption to securely store patient data. The survey found that healthcare professionals believe digitizing patient records and storing them in a centralized cloud system would improve access during emergencies and enable more efficient care compared to paper-based systems. However, ensuring privacy and security of patient data is paramount as healthcare incorporates these digital technologies.
Review on studies and research on widening of existing concrete bridgesIRJET Journal
This document summarizes several studies that have been conducted on widening existing concrete bridges. It describes a study from China that examined load distribution factors for a bridge widened with composite steel-concrete girders. It also outlines challenges and solutions for widening a bridge in the UAE, including replacing bearings and stitching the new and existing structures. Additionally, it discusses two bridge widening projects in New Zealand that involved adding precast beams and stitching to connect structures. Finally, safety measures and challenges for strengthening a historic bridge in Switzerland under live traffic are presented.
React based fullstack edtech web applicationIRJET Journal
The document describes the architecture of an educational technology web application built using the MERN stack. It discusses the frontend developed with ReactJS, backend with NodeJS and ExpressJS, and MongoDB database. The frontend provides dynamic user interfaces, while the backend offers APIs for authentication, course management, and other functions. MongoDB enables flexible data storage. The architecture aims to provide a scalable, responsive platform for online learning.
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
This paper proposes integrating Internet of Things (IoT) and blockchain technologies to help implement objectives of India's National Education Policy (NEP) in the education sector. The paper discusses how blockchain could be used for secure student data management, credential verification, and decentralized learning platforms. IoT devices could create smart classrooms, automate attendance tracking, and enable real-time monitoring. Blockchain would ensure integrity of exam processes and resource allocation, while smart contracts automate agreements. The paper argues this integration has potential to revolutionize education by making it more secure, transparent and efficient, in alignment with NEP goals. However, challenges like infrastructure needs, data privacy, and collaborative efforts are also discussed.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
This document provides a review of research on the performance of coconut fibre reinforced concrete. It summarizes several studies that tested different volume fractions and lengths of coconut fibres in concrete mixtures with varying compressive strengths. The studies found that coconut fibre improved properties like tensile strength, toughness, crack resistance, and spalling resistance compared to plain concrete. Volume fractions of 2-5% and fibre lengths of 20-50mm produced the best results. The document concludes that using a 4-5% volume fraction of coconut fibres 30-40mm in length with M30-M60 grade concrete would provide benefits based on previous research.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
The document discusses optimizing business management processes through automation using Microsoft Power Automate and artificial intelligence. It provides an overview of Power Automate's key components and features for automating workflows across various apps and services. The document then presents several scenarios applying automation solutions to common business processes like data entry, monitoring, HR, finance, customer support, and more. It estimates the potential time and cost savings from implementing automation for each scenario. Finally, the conclusion emphasizes the transformative impact of AI and automation tools on business processes and the need for ongoing optimization.
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
The document describes the seismic design of a G+5 steel building frame located in Roorkee, India according to Indian codes IS 1893-2002 and IS 800. The frame was analyzed using the equivalent static load method and response spectrum method, and its response in terms of displacements and shear forces were compared. Based on the analysis, the frame was designed as a seismic-resistant steel structure according to IS 800:2007. The software STAAD Pro was used for the analysis and design.
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
This research paper explores using plastic waste as a sustainable and cost-effective construction material. The study focuses on manufacturing pavers and bricks using recycled plastic and partially replacing concrete with plastic alternatives. Initial results found that pavers and bricks made from recycled plastic demonstrate comparable strength and durability to traditional materials while providing environmental and cost benefits. Additionally, preliminary research indicates incorporating plastic waste as a partial concrete replacement significantly reduces construction costs without compromising structural integrity. The outcomes suggest adopting plastic waste in construction can address plastic pollution while optimizing costs, promoting more sustainable building practices.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
A review on techniques and modelling methodologies used for checking electrom...nooriasukmaningtyas
The proper function of the integrated circuit (IC) in an inhibiting electromagnetic environment has always been a serious concern throughout the decades of revolution in the world of electronics, from disjunct devices to today’s integrated circuit technology, where billions of transistors are combined on a single chip. The automotive industry and smart vehicles in particular, are confronting design issues such as being prone to electromagnetic interference (EMI). Electronic control devices calculate incorrect outputs because of EMI and sensors give misleading values which can prove fatal in case of automotives. In this paper, the authors have non exhaustively tried to review research work concerned with the investigation of EMI in ICs and prediction of this EMI using various modelling methodologies and measurement setups.
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELgerogepatton
As digital technology becomes more deeply embedded in power systems, protecting the communication
networks of Smart Grids (SG) has emerged as a critical concern. Distributed Network Protocol 3 (DNP3)
represents a multi-tiered application layer protocol extensively utilized in Supervisory Control and Data
Acquisition (SCADA)-based smart grids to facilitate real-time data gathering and control functionalities.
Robust Intrusion Detection Systems (IDS) are necessary for early threat detection and mitigation because
of the interconnection of these networks, which makes them vulnerable to a variety of cyberattacks. To
solve this issue, this paper develops a hybrid Deep Learning (DL) model specifically designed for intrusion
detection in smart grids. The proposed approach is a combination of the Convolutional Neural Network
(CNN) and the Long-Short-Term Memory algorithms (LSTM). We employed a recent intrusion detection
dataset (DNP3), which focuses on unauthorized commands and Denial of Service (DoS) cyberattacks, to
train and test our model. The results of our experiments show that our CNN-LSTM method is much better
at finding smart grid intrusions than other deep learning algorithms used for classification. In addition,
our proposed approach improves accuracy, precision, recall, and F1 score, achieving a high detection
accuracy rate of 99.50%.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.