To see the other types of publications on this topic, follow the link: Hybrid security.

Journal articles on the topic 'Hybrid security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Hybrid security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Enns, Charis, Nathan Andrews, and J. Andrew Grant. "Security for whom? Analysing hybrid security governance in Africa's extractive sectors." International Affairs 96, no. 4 (July 1, 2020): 995–1013. http://dx.doi.org/10.1093/ia/iiaa090.

Full text
Abstract:
Abstract In this article, we analyse the factors underpinning the shift towards hybrid security governance in Africa. Extant scholarship largely attributes this shift to broader global processes, such as histories of colonialism, neoliberalism and transformations in global governance, which have served to legitimize the role of private authority in security provision around sites of resource extraction. Our analysis seeks to understand the relative and relational influence of power and rules in international politics by offering empirical insights about what hybrid security arrangements look like ‘on the ground’. Drawing upon recently conducted fieldwork in Kenya, Uganda and Ghana, we examine how hybrid security arrangements affect the lives of those living near sites of natural resource extraction. Our analyses suggest that although hybrid security has emerged as the leading approach to security governance, this approach to security does not uniformly involve or serve the interests of all stakeholders. Rather, we find that hybrid security arrangements aid the security of extractive operations—securing investments in both physical and human capital—while sometimes undermining the security of nearby communities.
APA, Harvard, Vancouver, ISO, and other styles
2

Saravanan, V., M. Sathishkumar, and M. Babu. "ATM Security System by using Hybrid Authentication." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (April 30, 2018): 1977–79. http://dx.doi.org/10.31142/ijtsrd11535.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Senhaji, Youssef, and Hicham Medromi. "Network Security: Hybrid IDPS." International Journal of Applied Information Systems 9, no. 5 (August 6, 2015): 5–8. http://dx.doi.org/10.5120/ijais2015451408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

CUREA, Cătălina-Gabriela. "А HYBRID SECURITY THREAT." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 24 (July 28, 2023): 67–72. http://dx.doi.org/10.19062/2247-3173.2023.24.9.

Full text
Abstract:
According with NATO Capstone Concept for the Military Contribution to Countering Hybrid Threats and EU Joint Framework to Counter Hybrid Threats, approved a new Military Strategy that will help set out NATO’s military priorities and approach to current and future challenges, including cyber and hybrid threats, instability across the Middle East and North Africa, and a more assertive Russia.[1]Hybrid conflict is defined as a dynamic interaction between elements of hard power (consolidation of military forces, deployment of military forces and capabilities in conflict zones, financing of separatist movements, activities to destabilize and undermine the security of a state or regions) and soft power ( maintaining an economic or energy dependence, applying economic sanctions, conducting propaganda, disinformation and influence campaigns, conducting cyber attacks, etc.)[2]. Hybrid warfare encompasses a vast area of hostile actions in which military force is only a small part of a flexible strategy with long-term objectives, complemented by political, economic and informational methods.
APA, Harvard, Vancouver, ISO, and other styles
5

Akrap, Gordan. "Hybrid Challenges Require Hybrid, Scientifically Based, Responses." National security and the future 20, no. 1-2 (January 9, 2020): 25–33. http://dx.doi.org/10.37458/nstf.20.1-2.4.

Full text
Abstract:
New security challenges are looking for new security paradigms in order that state and societies can successfully face with them on preventive level. Due to the rapid influence of hybrid threats to almost all areas of our lives today, we must change our attitude toward those problems and introduce and transform existing intelligence and security studies as a separate science in order to prepare our societies for security challenges that are already here.
APA, Harvard, Vancouver, ISO, and other styles
6

Kuppuswamy, Prakash, Saeed Qasim Yahya Al Khalidi Al-Maliki, Rajan John, Mohammad Haseebuddin, and Ahmed Ali Shaik Meeran. "A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm." Bulletin of Electrical Engineering and Informatics 12, no. 2 (April 1, 2023): 1148–58. http://dx.doi.org/10.11591/eei.v12i2.4967.

Full text
Abstract:
Today's digital data transmission over unsecured wired and wireless communication channels is making encryption algorithms an increasingly important tool for securing data and information. Hybrid encryption techniques combine encryption schemes of either two symmetric keys or both symmetric and asymmetric encryption methods, and that provides more security than public or private key single encryption models. Currently, there are many techniques on the market that use a combination of cryptographic algorithms and claim to provide higher data security. Many hybrid algorithms have failed to satisfy customers in securing data and cannot prevent all types of security threats. To improve the security of digital data, it is essential to develop novel and resilient security systems as it is inevitable in the digital era. The recommended algorithm scheme is a combination of the well-known Rivest Shamir Adleman (RSA) algorithm and a simple symmetric key (SSK) algorithm. The aim of this study is to develop a better encryption method using RSA and a newly proposed symmetric SSK algorithm. We believe that the proposed hybrid cryptographic algorithm provides more security and privacy.
APA, Harvard, Vancouver, ISO, and other styles
7

A. Correa, Roddy, Juan Ram髇 Bermejo Higuera, Javier Bermejo Higuera, Juan Antonio SiciliaMontalvo, Manuel S醤chez Rubio, and �. Alberto Magre襻n. "Hybrid Security AssessmentMethodology forWeb Applications." Computer Modeling in Engineering & Sciences 126, no. 1 (2021): 89–124. http://dx.doi.org/10.32604/cmes.2021.010700.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Abdul Majeed Haleem, Alyaa. "Voice Security Using Hybrid Algorithm." AL-Rafidain Journal of Computer Sciences and Mathematics 7, no. 2 (December 1, 2010): 107–18. http://dx.doi.org/10.33899/csmj.2010.163889.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

OSTROVSKA, Iryna. "HYBRID THREATS TO GLOBAL SECURITY." Public Administration and Civil Service, no. 1-76 (March 31, 2021): 68–78. http://dx.doi.org/10.52123/1994-2370-2021-76-1-63.

Full text
Abstract:
This article examines the phenomenon of the influence of hybrid threats on global world security in the modern conditions of globalization and the information and communication revolution. In particular, it is argued that hybrid wars have become a new type of interstate confrontation for solving military-political problems. Conflict events in post-Soviet Ukraine are considered as an example, leading to the emergence of new risks for an individual and society as a whole. At the end of the article, the author concludes that the conflict events in Ukraine, after gaining independence, have a significant impact on global security in the world. And although Ukraine is carrying out attempts to confront hybrid wars, the threats continue to be relevant, which poses the same challenges for the entire world society to counter.
APA, Harvard, Vancouver, ISO, and other styles
10

MANISHA, KUMARI, EKKA DEEKSHA, and YADAV NISHI. "A NOVEL HYBRID SECURITY ALGORITHM." i-manager's Journal on Information Technology 7, no. 2 (2018): 37. http://dx.doi.org/10.26634/jit.7.2.14651.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Gostev, A. N. "HYBRID WAR: PRACTICE, SECURITY ISSUES." Innovatics and Expert Examination, no. 1(26) (March 15, 2019): 237–57. http://dx.doi.org/10.35264/1996-2274-2019-1-237-257.

Full text
Abstract:
The article reveals the essence, the content of a hybrid war; its forces and means, traditional and innovative subsystems are shown; reveals and justifies the threats, the damaging factors, the inevitability and traditionalism of such wars; determines its differences from the classical; The special danger of organizational and other innovative weapons is being updated.
APA, Harvard, Vancouver, ISO, and other styles
12

Gordon, Adam. "The Hybrid Cloud Security Professional." IEEE Cloud Computing 3, no. 1 (January 2016): 82–86. http://dx.doi.org/10.1109/mcc.2016.21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Kulkarni, Utkarsha, Rosemeen Mansuri, and Riya Adikane. "File Storage on Cloud Using Cryptography." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 1950–53. http://dx.doi.org/10.22214/ijraset.2022.42652.

Full text
Abstract:
Abstract: Hybrid cryptography is implemented to provide the multilevel of encryption and decryption at both sender and receiver side which increase the security of the cloud storage. This security model gives the transparency to the cloud user. The hybrid encryption algorithm combines the advantages of fast encryption speed of AES algorithm, easy management of RSA algorithm key, and digital signature to ensure the secure transmission of confidential documents. Data/information is the most valuable asset for the modern electronic communication system. Securing data or information has become a challenge in this competitive world. There are many techniques for securing data/information such as cryptography, stenography etc. In this paper, hybrid cryptography has been applied using AES and RSA.AES and RSA algorithms are implemented to provide the multilevel of encryption and decryption at both sender and receiver side which increase the security of the cloud storage. This approach provides transparency to the cloud user as wellas cloud service provider in order to reduce the security threats. The proposed model is implemented in C and .NET. Data security is increased up to a maximum extent and it takes less time in uploading and downloading the text file as compare to existing system. [1] Index Terms: Hybrid, Symmetric, Asymmetric, Cloud, Cryptog-raphy.
APA, Harvard, Vancouver, ISO, and other styles
14

Fairosebanu, Abdul Azis, and Antony Cruz Nisha Jebaseeli. "Data security in cloud environment using cryptographic mechanism." Bulletin of Electrical Engineering and Informatics 12, no. 1 (February 1, 2023): 462–71. http://dx.doi.org/10.11591/eei.v12i1.4590.

Full text
Abstract:
Virtual computing resources are provided via a cloud system that is both clever and intelligent. Based on the user's request, computing resources are made available. A hybrid cloud is the best option for storing and accessing user data for cloud deployments. Maintaining security in a hybrid cloud environment is time-consuming. This study provides a novel strategy for securing data in the hybrid cloud by ensuring the user's data is protected. Users' data in a hybrid cloud is protected using cryptographic approaches provided in this approach. Using this strategy, users' data may be protected in public and private clouds using various encryption methods. The suggested data security paradigm offers various advantages to both consumers and providers in terms of data security. Three symmetric encryption methods are offered as a service in the cloud. The concept is implemented as a cloud-based application hosted in the cloud, and the effectiveness of three strategies is assessed. They are evaluated in terms of performance and security. Using the recommended encryption methods in a hybrid cloud environment is more efficient than using other methods. The proposed technique can be used for relational data. It can be modified and enhanced to process multimedia data.
APA, Harvard, Vancouver, ISO, and other styles
15

Streltsov, Volodymyr, and Oleksandr Moskalenko. "Shaping a ‘Hybrid’ CFSP to Face ‘Hybrid’ Security Challenges." European Foreign Affairs Review 22, Issue 4 (December 1, 2017): 513–32. http://dx.doi.org/10.54648/eerr2017038.

Full text
Abstract:
Despite the formal abolition of the ‘pillars’, in practice they have been preserved by special rules for the Common Foreign and Security Policy (CFSP). The current academic discourse about the CFSP reflects the dichotomy of supranational and intergovernmental EU components. The Russian ‘hybrid war’ as well as the concept of a ‘comprehensive approach’ for crisis management stressed the inter-dependence of different EU policies as well as the common responsibility of the EU institutions with no place for the existing division of the EU foreign policies. The article argues that the further development of supranational practices within the CFSP is a rational response to current ‘hybrid’1 challenges. This argument is supported by the post-Lisbon CFSP institutional dynamics, which reveal the need for synergy in this policy area and simultaneously offers a number of practical steps towards re-shaping its institutional architecture.
APA, Harvard, Vancouver, ISO, and other styles
16

Schroeder, Ursula C., Fairlie Chappuis, and Deniz Kocak. "Security Sector Reform and the Emergence of Hybrid Security Governance." International Peacekeeping 21, no. 2 (March 15, 2014): 214–30. http://dx.doi.org/10.1080/13533312.2014.910405.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Lee, Jun Hee. "Hybrid Data Management in Cloud Security." Asia-pacific Journal of Convergent Research Interchange 1, no. 4 (December 30, 2015): 29–35. http://dx.doi.org/10.21742/apjcri.2015.12.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Shalish, Wasim, A. Ghalwash, H. El-Deeb, and K. Badran. "Hybrid Database Performance Evaluation Achieving Security." International Conference on Electrical Engineering 8, no. 8th (May 1, 2012): 1–14. http://dx.doi.org/10.21608/iceeng.2012.30664.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Mandeep Kaur, Neha,. "Enhanced Security using Hybrid Encryption Algorithm." International Journal of Innovative Research in Computer and Communication Engineering 4, no. 7 (July 30, 2016): 13001–7. http://dx.doi.org/10.15680/ijircce.2016.0407001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Orobosade, Alabi, Thompson Aderonke, Alese Boniface, and Arome J. "Cloud Application Security using Hybrid Encryption." Communications on Applied Electronics 7, no. 33 (May 29, 2020): 25–31. http://dx.doi.org/10.5120/cae2020652866.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Mitrović, Miroslav. "Hybrid warfare and asymmetric security threats." Vojno delo 69, no. 7 (2017): 333–47. http://dx.doi.org/10.5937/vojdelo1705333m.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Bagayoko, Niagalé. "Introduction: Hybrid Security Governance in Africa." IDS Bulletin 43, no. 4 (July 2012): 1–13. http://dx.doi.org/10.1111/j.1759-5436.2012.00330.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Sood, Sandeep K. "Hybrid Data Security Model for Cloud." International Journal of Cloud Applications and Computing 3, no. 3 (July 2013): 50–59. http://dx.doi.org/10.4018/ijcac.2013070104.

Full text
Abstract:
Security of data is one of the main concern in the implementation of cloud computing. This paper proposes a highly effective and efficient cloud security model. The proposed security model keeps the most critical data on the private cloud and the rest of it on the public cloud. It uses hash codes to check the integrity of the data at the public cloud. The proposed cloud security model provides the provision of defining user roles thereby determining the type of access the user exercises on the data. This model uses dual verification mechanism for user authentication by using username and password on one layer and key authentication on another layer. A cryptographic process is used to make the overall security of the data on the cloud highly robust. A comprehensive security analysis of the model is done against various types of attacks and the results are very promising. This model is compared to various existing cloud security models and the results shows that our technique is faster, much more robust and efficient as compared to other existing models. This model is cost effective because it uses private cloud only for highly sensitive data. Rest of data is stored on the public cloud, where data storage cost is comparatively very less.
APA, Harvard, Vancouver, ISO, and other styles
24

Ahmed, Musa Midila. "Hybrid Encryption for Messages’ Confidentiality in SOSE-Based IOT Service Systems." International Journal of Innovative Computing 11, no. 2 (October 31, 2021): 1–6. http://dx.doi.org/10.11113/ijic.v11n2.292.

Full text
Abstract:
Internet of Things (IOT) is an essential paradigm where devices are interconnected into network. The operations of these devices can be through service-oriented software engineering (SOSE) principles for efficient service provision. SOSE is an important software development method for flexible, agile, loose-coupled, heterogeneous and interoperable applications. Despite all these benefits, its adoption for IOT services is slow due to security challenges. The security challenge of integration of IOT with service-oriented architecture (SOA) is man-in-the-middle attack on the messages exchanged. The transport layer security (TLS) creates a secured socket channel between the client and server. This is efficient in securing messages exchanged at the transport layer only. SOSE-based IOT systems needs an end-to-end security to handle its vulnerabilities. This integration enables interoperability of heterogeneous devices, but renders the system vulnerable to passive attacks. The confidentiality problem is hereby addressed by message level hybrid encryption. This is by encrypting the messages by AES for efficiency. However, to enable end-to-end security, the key sharing problem of advanced encryption standard (AES) is handled by RSA public key encryption. The results shows that this solution addressed data contents security and credentials security privacy issues. Furthermore, the solution enables end-to- end security of interaction in SOSE-based IOT systems.
APA, Harvard, Vancouver, ISO, and other styles
25

Kalaiselvi, K., N. Jayashri, and G. Saraswathi. "Protected Data Using Hybrid Algorithm in Cloud." International Journal of Engineering & Technology 7, no. 3.27 (August 15, 2018): 318. http://dx.doi.org/10.14419/ijet.v7i3.27.17898.

Full text
Abstract:
Cloud computing providing confidentiality over the insensitive data was the major issue related to security. It verifies the data owned by the server through linear computations. The proposed work enables security and efficiency using the cryptographic techniques of hybrid algorithms, securing the sensitive information that is present in the cloud. In the hybrid algorithm, it is the combination of problem encryption, key generation, result decryption and proof generation. It also validates the results which are being computed and also provides end-to-end confidentiality over the data to both the end user. The uses of hybrid algorithm results in a random key generation, encrypt/decrypt, and validate the satisfied results. This will provide a low cost to both server and client.
APA, Harvard, Vancouver, ISO, and other styles
26

Manap, A. T., and G. A. Abitova. "Development of information technology for secure file storage based on hybrid cryptography methods." Bulletin of Shakarim University. Technical Sciences 1, no. 4(12) (December 28, 2023): 39–46. http://dx.doi.org/10.53360/2788-7995-2023-4(12)-6.

Full text
Abstract:
This article explores the development of information technology for secure file storage based on hybrid cryptography methods. It highlights the importance of secure file storage in the digital age and introduces hybrid cryptography as a solution for enhanced data security. The purpose of the article is to provide a comprehensive understanding of the benefits and advancements in hybrid cryptography for secure file storage.The article discusses the differences between symmetric and asymmetric encryption algorithms and introduces hybrid cryptography as a combination of both. It delves into the advantages of hybrid cryptography, emphasizing its ability to provide robust security and efficient data protection. The use of hybrid cryptography in encryption at rest and encryption in transit is examined, highlighting its role in securing stored data and ensuring secure data transmission.Moreover, the article explores the authentication, integrity, and reliability features provided by hybrid cryptography. It discusses the importance of key management and its impact on secure file storage.
APA, Harvard, Vancouver, ISO, and other styles
27

Briggs, Chad. "Climate Change and Hybrid Warfare Strategies." Journal of Strategic Security 13, no. 4 (December 2020): 45–57. http://dx.doi.org/10.5038/1944-0472.13.4.1864.

Full text
Abstract:
Concepts of hybrid warfare and climate security are contested on their own, and are rarely considered as connected in planning for future security risks. Yet climate change presents new hazards for national security, and opportunities for those looking to foment instability and uncertainty in traditional institutions. This article examines the connections between climate change risks and hybrid war strategies, and focuses on concepts of resilience targeting, information warfare, and geoengineering, illustrating that ‘full spectrum’ analyses of security are necessary in developing future security strategies.
APA, Harvard, Vancouver, ISO, and other styles
28

Patwa, Sanjivani, and Jayram Dwivedi. "Authentication based Hybrid Security Method for Securing Data in Cloud Environment." International Journal of Computer Applications 139, no. 7 (April 15, 2016): 27–31. http://dx.doi.org/10.5120/ijca2016909202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

STONIČ, DAVID. "PREDSTAVITEV MODELA ZA PREPOZNAVANJE HIBRIDNIH GROŽENJ." 20 YEARS OF CONTEMPORARY MILITARY CHALLENGES/20 LET SODOBNIH VOJAŠKIH IZZIVOV, VOLUME 2018, ISSUE 20/4 (October 15, 2018): 105–18. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.20.4.5.

Full text
Abstract:
Povzetek V spremenjenem varnostnem okolju moramo razviti ustrezne koncepte in orodja za pravočasno prepoznavanje in opredelitev hibridnih groženj, da bi se lahko uspešno odzvali. Oblikovali smo model, ki grožnje poveže z akterjem. Ovrednoteni obveščevalni podatki so vstopne informacije v izdelan model za ocenjevanje hibridne ogroženosti nacionalne varnosti. Izhodna informacija je identificirana hibridna grožnja. Ob izpolnitvi pogoja hibridne ogroženosti lahko nacionalnovarnostni sistem začne izvajati ukrepe, ki bi zmanjšali zmožnosti delovanja hibridnega akterja. Zavedanje o obstoju hibridnih groženj in njihovo identificiranje bo spodbudilo odločevalce v nacionalnovarnostnem sistemu, da bodo zagotovili ustrezno hibridno odpornost države, saj je primarna odgovornost za spoprijemanje s hibridnimi grožnjami predvsem odgovornost države. Nujen je celostni vladni pristop v povezavi z Evropsko unijo in Severnoatlantskim zavezništvom. Ključne besede: hibridne grožnje, indikatorji konvencionalnega ogrožanja, indikatorji nekonvencionalnega ogrožanja. Abstract In the changed security environment, we have to be able to develop appropriate concepts and tools for timely identification and definition of hybrid threats. We have developed a model, which relates threats with actors. The evaluated intelligence then serves as input information for the national security hybrid threat evaluation model. The output information is an identified hybrid threat. When a hybrid threat is identified, the national security system can take adequate measures to hinder the operational ability of hybrid actors. The awareness of hybrid threats and their identification will encourage decision makers in the national security system to ensure adequate hybrid resilience of the country, since countering hybrid threats is a state’s primary responsibility, which requires a comprehensive governmental approach in cooperation with the European Union and the North Atlantic Alliance. Key words: Hybrid threats, conventional threat indicators, unconventional threat indicators
APA, Harvard, Vancouver, ISO, and other styles
30

Dr Asha Ambhaikar, Mr Abhishek Guru,. "AES AND RSA-BASED HYBRID ALGORITHMS FOR MESSAGE ENCRYPTION & DECRYPTION." INFORMATION TECHNOLOGY IN INDUSTRY 9, no. 1 (March 1, 2021): 273–79. http://dx.doi.org/10.17762/itii.v9i1.129.

Full text
Abstract:
File encryption is an easy means of securing personal or business data protection. The RSA and AES representative encryption algorithms are not capable of satisfying the criteria of file encryption reliability and security when used separately. A hybrid encryption algorithm mixing AES and RSA algorithms is suggested in this paper to overcome the above issues in order to solve file encryption performance and security problems. The experimental results suggest that the RSA and AES hybrid encryption algorithm can not only encrypt files, but also provide the benefits of efficiency and protection of the algorithm.
APA, Harvard, Vancouver, ISO, and other styles
31

Balto, Karl Edvard, Muhammad Mudassar Yamin, Andrii Shalaginov, and Basel Katt. "Hybrid IoT Cyber Range." Sensors 23, no. 6 (March 13, 2023): 3071. http://dx.doi.org/10.3390/s23063071.

Full text
Abstract:
The use of IoT devices has increased rapidly in recent times. While the development of new devices is moving quickly, and as prices are being forced down, the costs of developing such devices also needs to be reduced. IoT devices are now trusted with more critical tasks, and it is important that they behave as intended and that the information they process is protected. It is not always the IoT device itself that is the target of a cyber attack, but rather, it can be a tool for another attack. Home consumers, in particular, expect these devices to be easy to use and set up. However, to reduce costs, complexity, and time, security measures are often cut down. To increase awareness and knowledge in IoT security, education, awareness, demonstrations, and training are necessary. Small changes may result in significant security benefits. With increased awareness and knowledge among developers, manufacturers, and users, they can make choices that can improve security. To increase knowledge and awareness in IoT security, a proposed solution is a training ground for IoT security, an IoT cyber range. Cyber ranges have received more attention lately, but not as much in the IoT field, at least not what is publicly available. As the diversity in IoT devices is large with different vendors, architectures, and components and peripherals, it is difficult to find one solution that fits all IoT devices. To some extent, IoT devices can be emulated, but it is not feasible to create emulators for all types of devices. To cover all needs, it is necessary to combine digital emulation with real hardware. A cyber range with this combination is called a hybrid cyber range. This work surveys the requirements for a hybrid IoT cyber range and proposes a design and implementation of a range that fulfills those requirements.
APA, Harvard, Vancouver, ISO, and other styles
32

Taji, Khaoula, Badr Elkhalyly, Yassine Taleb Ahmad, Ilyas Ghanimi, and Fadoua Ghanimi. "Securing Smart Agriculture: Proposed Hybrid Meta-Model and Certificate-based Cyber Security Approaches." Data and Metadata 2 (December 30, 2023): 155. http://dx.doi.org/10.56294/dm2023155.

Full text
Abstract:
The Internet of Things (IoT) is a decentralized network of physically connected devices that communicate with other systems and devices over the internet. As the number of IoT-based devices continues to grow at an exponential rate, this technology has the potential to improve nearly every aspect of daily life, from smart networks and transportation to home automation and agriculture. However, the absence of adequate security measures on all levels of the IoT poses a significant security risk, with the potential for cyber-attacks and data theft. While scholars have suggested various security measures, there are still gaps that need to be addressed. In this study, we analyzed previous research and proposed metamodels for security, IoT, and machine learning. We then proposed a new IoT-based smart agriculture model with integrated security measures to mitigate cyber- attacks and increase agricultural output. Our model takes into account the unique features of the smart farming domain and offers a framework for securing IoT devices in this specific application area. Moreover, in order to mitigate a range of cyber security attacks across various layers of IoT, we introduced two certificate-based schemes named CBHA and SCKA for smart agriculture. A comparative analysis of their security with existing literature demonstrates their superior robustness against diverse attacks. Additionally, security testing utilizing scyther affirms the resilience and security of both CBHA and SCKA, establishing them as viable options for ensuring security in smart agriculture.
APA, Harvard, Vancouver, ISO, and other styles
33

Nenad, Nenad, and Rina Kirkova. "THE CONCEPT OF HYBRID THREATS." Knowledge International Journal 28, no. 6 (December 10, 2018): 1795–99. http://dx.doi.org/10.35120/kij28061795n.

Full text
Abstract:
In 2016, during the Warsaw summit, NATO and EU reached an agreement to improve the cooperation in the fight against the hybrid threats, describing the security situation in Europe as space where many hybrid activities take place. The security environment of the modern democratic societies is endangered due to the intensive hybrid activities that are manifested via campaigns aimed to misinform, hostile cyber-activities and radicalisation of vulnerable groups in the society.The security environment during the Cold War was defined with the two confronting super powers, with each trying to surpass the other building an international security system of bipolar relations. Today, in state of hybrid threats, when the security environment is not more secure than during the Cold War, the security setting is much harder to define. The threats, methods of action and activities are multidimensional and the relations among various actions remain unclear.The state actor constantly try to become stronger, while the non-state actors seek own statehood or recognition of their activities. Seeking to achieve their own ambitions, the non-state actors challenge the West and its institutions, representing thus hybrid threats for their security. Dealing with the hybrid threats includes synchronised use of military and non-military means against specific weaknesses of the enemy. Unless detected and dealt within timely manner, the state of dealing with hybrid threats will reach the state of hybrid warfare.We live in a time of hybrid influences, where state and non-state actors challenge the modern western democracies and their institution that are considered to be a threat or competition in meeting their goals and interests. The aim of the hybrid threats is to create – by detecting the adversary’s weaknesses, such as ideological differences, technological deficiency, society polarisation, geostrategic factors and infrastructure – conditions to achieve their own goals.If the desired goals are not achieved with the hybrid methods, the hybrid threats can create conditions for future conflict, when the situation can escalate in hybrid war with significant increase of the armed violence. The modern democratic states should have coordinated coherent approach to understand, detect and respond to hybrid threats as collective interest.
APA, Harvard, Vancouver, ISO, and other styles
34

Varnalii, Z., and T. Tomashevskyi. "Financial Security of Ukraine in Hybrid War." Bulletin of Taras Shevchenko National University of Kyiv. Economics, no. 204 (2019): 6–13. http://dx.doi.org/10.17721/1728-2667.2019/204-3/1.

Full text
Abstract:
The article explores theoretical, methodological and applied aspects of strengthening Ukraine’s financial security in the conditions of hybrid war. The financial security is shown as one of the key elements of economic security with the state of public finances being directly related to the status of the national economy while the country’s economic welfare depends largely on the level of financial security provided to every individual, the society and the nation as a whole. To study this hypothesis, a system of general and special methods is used as a theoretical and methodological basis, namely, the dialectical method of cognition is used to evaluate the theoretical and normative principles of understanding financial security in the structure of a country’s national and economic security; methods of causal analysis are used to directly analyze the functioning of financial security in modern conditions of development of Ukraine; comparative analysis methods are used to study the similarities and differences between various elements of the state’s national security structure.
APA, Harvard, Vancouver, ISO, and other styles
35

Wunderer, Thomas. "A detailed analysis of the hybrid lattice-reduction and meet-in-the-middle attack." Journal of Mathematical Cryptology 13, no. 1 (March 1, 2019): 1–26. http://dx.doi.org/10.1515/jmc-2016-0044.

Full text
Abstract:
Abstract Over the past decade, the hybrid lattice-reduction and meet-in-the middle attack (called hybrid attack) has been used to evaluate the security of many lattice-based cryptographic schemes such as NTRU, NTRU Prime, BLISS and more. However, unfortunately, none of the previous analyses of the hybrid attack is entirely satisfactory: They are based on simplifying assumptions that may distort the security estimates. Such simplifying assumptions include setting probabilities equal to 1, which, for the parameter sets we analyze in this work, are in fact as small as 2^{-80} . Many of these assumptions lead to underestimating the scheme’s security. However, some lead to security overestimates, and without further analysis, it is not clear which is the case. Therefore, the current security estimates against the hybrid attack are not reliable, and the actual security levels of many lattice-based schemes are unclear. In this work, we present an improved runtime analysis of the hybrid attack that is based on more reasonable assumptions. In addition, we reevaluate the security against the hybrid attack for the NTRU, NTRU Prime and R-BinLWEEnc encryption schemes as well as for the BLISS and GLP signature schemes. Our results show that there exist both security over- and underestimates in the literature.
APA, Harvard, Vancouver, ISO, and other styles
36

Ratushnyi, Roman, and Anatoliy Tryhuba. "Features of Identification of Hybrid Projects of Public Security Systems and Their Process Management." Internal Security 13, no. 1 (September 27, 2021): 77–88. http://dx.doi.org/10.5604/01.3001.0015.2901.

Full text
Abstract:
An analysis of scientific works defining methodologies, methods and models of managing development projects and the functioning of security systems concerning separate branches and territories, as well as approaches to the implementation of hybrid projects of public security systems has been performed. It has been established that there is a need to conduct research on the development of scientific and methodological identification of hybrid projects of public security systems and their management processes. Nine identifying features of hybrid public safety projects are outlined. The proposed characteristics identifying hybrid projects of public security systems are based on their initiation and implementation of management processes. The hierarchical model of the structure of hybrid projects of public security systems is substantiated. It provides for the consideration of hybrid projects of public security systems at three levels which outline the purposeful and continuously managed interaction between individual processes and their elements. It is substantiated that the purposefulness and manageability properties of hybrid projects of public safety systems significantly affect the indicators of their value and underlie the development of tools for determining the value of these projects. Further research requires the development of tools to determine the value of hybrid projects of public safety systems.
APA, Harvard, Vancouver, ISO, and other styles
37

Khriapynskyi, Anton, Ihor Khmyrov, Ivo Svoboda, Mykhailo Shevchuk, and Vira Iastrebova. "State information security strategies in conditions of hybrid threats." Revista Amazonia Investiga 12, no. 69 (September 30, 2023): 84–93. http://dx.doi.org/10.34069/ai/2023.69.09.7.

Full text
Abstract:
Hybrid information threats under the conditions of modern development of digital technologies are currently becoming one of the major issues for a modern democracy. The amount of damage that hybrid threats bring to the world economy contributes to the establishment of effective legal mechanisms to combat them. The purpose of the study was to single out the information security strategies under conditions of hybrid threats, including the spread of disinformation and fake news. The application of the comparative analysis method mad it possible to identify the gaps in information security strategies for countering hybrid threats. The strategy of information security in the conditions of hybrid threats is a coordinated action plan aimed at countering and fighting hybrid threats to safeguard cyberspace and preserve a democracy. Information security against hybrid threats is based on such cornerstones as: availability, confidentiality, integrity of information data, and safety. Enhancement of information security under the conditions of hybrid threats should be carried out at the expense of digital transformation, increasing the level of digital literacy of society and establishing a fair responsibility measure for a purposeful spreading of disinformation. The perspective of further research is addressing information security strategies as well as elaborating practical guidelines for the formation of a secure information space.
APA, Harvard, Vancouver, ISO, and other styles
38

Parakhonsky, Borys, and Galina Yavorska. "DESTABILIZING EUROPE: RUSSIA’S HYBRID WARFARE." Strategic Panorama, no. 1-2 (December 7, 2021): 5–29. http://dx.doi.org/10.53679/2616-9460.1-2.2021.01.

Full text
Abstract:
The European Union is in a political and security crisis. The crisis tends to become existential, which undermines the future of the EU as an integration project. The conflict of values between liberal democracy and authoritarianism is becoming an important factor in international security. Negative current trends in the international security environment increase risks for the EU. In its foreign policy the EU does not demonstrate the ability to speak with one voice. It does not support EU’s ambition to be a global international actor. Within the EU, centrifugal tendencies and Euroscepticism appear to be gaining ground. Among the destructive external and internal factors affecting European security, the hybrid threat posed by Moscow’s ambitious plans and aggressive actions is at the forefront. These actions are aimed at undermining democracies, international solidarity and security. Russia is systematically acting to destabilize the EU, using a set of means of destructive influence, trying to undermine European unity both externally and internally. Russia’s aggression against Ukraine, operations in Syria and Libya, interference in domestic processes in the EU, etc., are exacerbating destructive trends in the European security environment. In this con- text, the EU faces the need to increase its resilience, as a tool to deter destructive actions of the Russian Federation and a means to mitigate their effect. The purpose of the article is to analyze the causes and consequences of Russia’s hybrid influence against the EU, plus to identify the means of Russia’s destructive impact, such as the spread of misinformation, active special operations, energy pressure, etc. The article examines the imperatives of Russian foreign policy, the impact of the value crisis on the European project and its future, as well as obstacles to strategic dialogue between the EU and Russia. Europe returns to searching for its collective European identity, discussing revitalization of the global European narrative. Maintaining a system of liberal democratic values is a key precondition for the future of the EU in order to avoid the risk of disintegration of the European Union. Sovereignty and territorial integrity of Ukraine, its national security could be guaranteed only by full-fledged integration into the European political, economic and security space. Europe’s hesitations regarding the European perspective for Ukraine, which arise under pressure from the Kremlin and internal contradictions in the EU, negatively affect the security environment in Europe.
APA, Harvard, Vancouver, ISO, and other styles
39

S, Prabu, Gpinath Ganapathy, and Ranjan Goyal. "Enhanced Data Security for Public Cloud Environment with Secured Hybrid Encryption Authentication Mechanisms." Scalable Computing: Practice and Experience 19, no. 4 (December 29, 2018): 351–60. http://dx.doi.org/10.12694/scpe.v19i4.1422.

Full text
Abstract:
Cloud computing is an evolving computing technology that provides many services such as software and storage. With the introduction of cloud storage, the security of outsourced data has become a major issue in cloud computing. Data storage in cloud computing environment needs to be secured in order to provide a safe and foolproof security for data outsourcing of the cloud service users. This paper presents a model for security of data in public cloud storage environment which successfully detects the unauthenticated access or any anomaly in the data. The proposed authentication model along with the data security model presented in this paper shows that this model is the best model suitable for securing the data in cloud computing environment
APA, Harvard, Vancouver, ISO, and other styles
40

Savla, Dhairya, and Prof Ruchi Rautela. "Design and Improvement of Caesar Cipher." International Journal for Research in Applied Science and Engineering Technology 11, no. 7 (July 31, 2023): 1190–94. http://dx.doi.org/10.22214/ijraset.2023.54819.

Full text
Abstract:
Abstract: Cyber security is the application of technologies, processes and controls to guard systems, networks, programs, devices and data from cyber-attacks. Cryptology is the study of securing Computer systems that allow only sender and receiver to read it.Cryptology comes from Greek word ‘Kryptos’ which means ‘hidden’ and ‘logos’ means ‘to study of’. Even though security is important, numerous applications have been created without considering fundamental points of data security that is confidentiality, authentication, and availability. As we depend more on the internet, security issues and problems will also increase. To prevent alteration or access of data by unauthorized persons, cryptography is required. A methodology is proposed to increase the efficiency of the Caesar cipher which is the simplest cipher. This research introduces a new hybrid secure Caesar cipher by combining the three most important Ciphers (Caesar Cipher, Vigenère Cipher, Polybius Cipher) and Diffie-Hellman technique This hybrid encryption cipher provides better security as compared to normal Caesar ciphers.
APA, Harvard, Vancouver, ISO, and other styles
41

Subbarayudu, Yerragudipadu, Gurram Vijendar Reddy, Merugu Shankar, Mailagani Ven, P. K. Abhilash, and Archana Sehgal. "Cipher Craft: Design and Analysis of Advanced Cryptographic Techniques for Secure Communication Systems." MATEC Web of Conferences 392 (2024): 01112. http://dx.doi.org/10.1051/matecconf/202439201112.

Full text
Abstract:
The name “cryptography” comes from a Greek word that refers to the art of securing data by organizing it in a disorganized and unintelligible way. It combines software engineering with math. The explosive expansion of the Internet has led to a greater awareness of intriguing uncertainty concerns. Although security is the biggest concern when it comes to the internet, many apps have been developed and designed without taking confidentiality, authentication, and protection—the three essential components of data security—into account. Knowing these kinds of security problems and challenges is going to be more important as our daily activities rely more and more on data networks. Cryptography is necessary to prevent some unwanted customers or persons from gaining access to the data. This study presents a novel hybrid security cipher that combines the three most significant ciphers, such as the Caesar, Rail Fence and Vigenère ciphers. When compared to traditional ciphers, this hybrid encryption cipher offers more security.
APA, Harvard, Vancouver, ISO, and other styles
42

Dai, Honglong, Ding Wang, Jinyong Chang, and Maozhi Xu. "On the RCCA Security of Hybrid Signcryption for Internet of Things." Wireless Communications and Mobile Computing 2018 (November 12, 2018): 1–11. http://dx.doi.org/10.1155/2018/8646973.

Full text
Abstract:
With the rapid development of the Internet of Things (IoT), a lot of sensitive information in our daily lives are now digitalized and open to remote access. The provision of security and privacy of such data would incur comprehensive cryptographic services and has raised wide concern. Hybrid signcryption schemes could achieve various kinds of cryptographic services (e.g., confidentiality, authenticity, and integrity) with much lower cost than the combination of separate traditional cryptographic schemes with each providing a single cryptographic service. Thus, hybrid signcryption schemes are very suitable for IoT environments where resources are generally very constrained (e.g., lightweight sensors and mobile phones). To ensure that the overall hybrid signcryption scheme provides adequate cryptographic service (e.g., confidentiality, integrity, and authentication), its parts of KEM (key encryption mechanism) and DEM (data encryption mechanism) must satisfy some security requirements. Chosen-ciphertext attack (CCA) security has been widely accepted as the golden standard requirement for general encryption schemes. However, CCA security appears too strong in some conditions. Accordingly, Canetti et al. (CRYPTO 2003) proposed the notion of replayable CCA security (RCCA) for encryption schemes, which is a strictly weaker security notion than CCA security and naturally more efficient. This new security notion has proved to be sufficient for most existing applications of CCA security, e.g., encrypted password authentication. This is particularly promising for IoT environments, where security is demanding, yet resources are constrained. In this paper, we examine the RCCA security of the well-known SKEM+DEM style hybrid signcryption scheme by Dent at ISC 2005. Meanwhile, we also examine the RCCA security of the Tag-SKEM+DEM style hybrid signcryption scheme by Bjorstad and Dent at PKC 2006. We rigorously prove that a hybrid signcryption scheme can achieve RCCA security if both its SKEM part and its DEM part satisfy some security assumptions.
APA, Harvard, Vancouver, ISO, and other styles
43

Obinna, Franklin. "Hybrid Regional Order." Journal of International Peacekeeping 20, no. 3-4 (August 17, 2016): 363–94. http://dx.doi.org/10.1163/18754112-02003013.

Full text
Abstract:
The un peace operations have undergone significant revisions to calibrate mission mandates in tandem with emerging threats to international peace and security, especially non-traditional security (nts) threats that stem from governance challenges. These multidimensional missions essentially perform statebuilding interventions (sbis) through capacity-building programmes. The future of these missions depends on negotiated political settlements that facilitate the creation of accountable institutions and inclusive societies. Scholars debate the future of un peace missions, especially as it relates to stabilization operations. On the one hand, are the “narrowers” who believe that peace operations should remain focused on stabilizing state authorities. On the other hand, are the “broadeners” who favor people-focused stabilization operations. This article argues for a broad approach. Focusing on the role of regional organizations under Chapter viii of the un Charter, it argues that successive failures by the African Union to implement its doctrinal instruments, particularly the Post Conflict Reconstruction and Development Policy, the African Charter on Democracy, Elections and Governance and the Common African Defence and Security Policy has narrowed its peace interventions in Africa to peace enforcement operations. To be relevant, the African Union needs to focus on the challenges of governance in Africa.
APA, Harvard, Vancouver, ISO, and other styles
44

Abdallah, Hanaa A., Reem Alkanhel, and Abdelhamied A. Ateya. "Novel Hybrid Fusion-Based Technique for Securing Medical Images." Electronics 11, no. 20 (October 21, 2022): 3421. http://dx.doi.org/10.3390/electronics11203421.

Full text
Abstract:
The security of images has gained great interest in modern communication systems. This is due to the massive critical applications that are based on images. Medical imaging is at the top of these applications. However, the rising number of heterogenous attacks push toward the development of securing algorithms and methods for imaging systems. To this end, this work considers developing a novel authentication, intellectual property protection, ownership, and security technique for imaging systems, mainly for medical imaging. The developed algorithm includes two security modules for safeguarding various picture kinds. The first unit is accomplished by applying watermarking authentication in the frequency domain. The singular value decomposition (SVD) is performed for the host image’s discrete cosine transform (DCT) coefficients. The singular values (S) are divided into 64 × 64 non-overlapping blocks, followed by embedding the watermark in each block to be robust to any attack. The second unit is made up of two encryption layers to provide double-layer security to the watermarked image. The double random phase encryption (DRPE) and chaotic encryption have been tested and examined in the encryption unit. The suggested approach is resistant to common image processing attacks, including rotation, cropping, and adding Gaussian noise, according to the findings of the experiments. The encryption of watermarked images in the spatial and DCT domains and fused watermarked images in the DCT domain are all discussed. The transparency and security of the method are assessed using various measurements. The proposed approach achieves high-quality reconstructed watermarks and high security by using encryption to images and achieves robustness against any obstructive attacks. The developed hybrid algorithm recovers the watermark even in the presence of an attack with a correlation near 0.8.
APA, Harvard, Vancouver, ISO, and other styles
45

Afifi Al-Atsari, Hilmi, and Imam Suharjo. "Integrasi Server On-Premise dengan Server Cloud Menggunakan Cloud VPN dan Mikrotik Ipsec Untuk Peningkatan Keamanan Koneksi." Jurnal Syntax Admiration 4, no. 11 (November 14, 2023): 1977–96. http://dx.doi.org/10.46799/jsa.v4i11.757.

Full text
Abstract:
In the ever-evolving digital era, integration of onpremise server infrastructure with cloud servers has become an important focus for many companies. The problem faced is regarding connections that use public IP addresses directly, which are often vulnerable to various security risks and cyber threats. Therefore, this research aims to identify and overcome the main problems that arise in this integration. With a better understanding of these challenges, developers and organizations can improve the security of their hybrid server infrastructure. The research methodology uses Mikrotik IPsec and VPN Tunnel IKEv2 on Google Cloud services. This approach is utilized to increase connection security between onpremise servers and cloud servers. First, the author configures Mikrotik IPsec on the onpremise server and sets up the IKEv2 VPN Tunnel on Google Cloud services. Next, the author carried out practical tests by sending data between the two infrastructures and monitoring the security and stability of the connection. With these steps, we can evaluate the effectiveness of security solutions implemented in a hybrid server environment. The research results show that this approach is successful in securing the connection between the two infrastructures, reducing potential risks such as sniffing, port scanning attacks, brute force, DDOS, and other cyber threats. Moreover, during practical trials, the connection remained stable and performed optimally, demonstrating the effectiveness of the proposed solution in improving the security of hybrid server infrastructure. These results can provide concrete evidence that using Mikrotik IPsec and VPN Tunnel IKEv2 on Google Cloud services can be an effective step in securing communications between onpremise servers and cloud servers. Thus, this research provides valuable guidance for developers and organizations looking to implement similar solutions.
APA, Harvard, Vancouver, ISO, and other styles
46

Daniel, Jan, and Jakub Eberle. "Hybrid Warriors: Transforming Czech Security through the 'Russian Hybrid Warfare' Assemblage." Czech Sociological Review 54, no. 6 (December 1, 2018): 907–32. http://dx.doi.org/10.13060/00380288.2018.54.6.435.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Rodachin, V. M. "Hybrid War and the National Security of Russia." Humanities and Social Sciences. Bulletin of the Financial University 9, no. 4 (December 4, 2019): 93–99. http://dx.doi.org/10.26794/2226-7867-2019-9-4-93-99.

Full text
Abstract:
The article is devoted to the military conflicts of the XXI century and the existing approaches to their understanding of the foreign and domestic scientific literature. The subject of research is the phenomenon and theory of “hybrid war”, which originated in the late 1990s — early 2000s, and are widely used in current conditions. The founders of the term, theoretical concept and military doctrinal foundations of “hybrid war” are American military experts. The article reveals the stages of formation of the theory of hybrid war, the existing militarytheoretical and political-ideological approaches to the characterisation of its essence. The author emphasised the unfounded nature of the accusations against the Russian Federation about the “annexation of Crimea”, the implementation of “hybrid aggression” in the South-East of Ukraine and other regions. Further, the author presented the analysis of real, not fictional signs of “hybrid war”. The author concluded that hybrid wars are a new instrument of aggression of the neo-Imperial Western powers against sovereign States as opposed to the hegemony of the United States in the crisis of the unipolar world order. The necessity of improving the system of national security of Russia taking into account the USA and NATO unleashing against our country “hybrid war” and its possible escalation is substantiated.
APA, Harvard, Vancouver, ISO, and other styles
48

Borsukovskyi, Yurii. "DEFINING REQUIREMENTS TO DEVELOP INFORMATION SECURITY CONCEPT N HYBRID THREATS CONDITIONS. PART 1." Cybersecurity: Education, Science, Technique, no. 5 (2019): 61–72. http://dx.doi.org/10.28925/2663-4023.2019.5.6172.

Full text
Abstract:
Current article provides the analysis of recent trends in realization of cyber threats and collects the basic requirements for development of information security concept in hybrid threats conditions. It covers the key tendencies of realization at cyber space of principles of hybrid war. Envisages that preconditions for occurrence of such hybrid wars constitute the interest of governmental agencies in information that might be used by opposing parties in world`s competition and political battles, as well the possibility of effective monetization of harmful impact at information and automated systems of companies. The article defines the necessity in adaptive development of directions in application of preventive actions at information and cyber security. It underlines the absence, at most cases, of strategy to ensure security of the key information systems considering the existing risks. Article emphasize that the information security concept in hybrid threats conditions shall consider the possibility of complete compromising of systems of information and cyber security in case of targeted attack at information resources of structural units of state, banking and private organizations. It considers the model structure of information security concept in hybrid threats conditions to ensure the effectiveness of functioning of information and automated systems of information and cyber security in conditions of limited financing. It provides structure and content of the concept of information security in hybrid threats conditions. Article defines that the information security concept at hybrid threats conditions shall cover the main tasks and objectives, and the general strategy for development of IT and system for managing of information security within the company. It formulates the requirements and basic approaches to its implementation. The article defines that the possible way to optimize the financial resources assigned for IT systems and information and cyber security systems according to the risks defined, might be the use of the best world practices, as well the strict coordination of requirements to ensure the informatization and digital transformation from business and development of coordinated regulatory requirements to the certain businesses from information and cyber security perspective.
APA, Harvard, Vancouver, ISO, and other styles
49

Crihan, Georgiana, Marian Craciun, and Luminita Dumitriu. "HYBRID METHODS OF AUTHENTICATION IN NETWORK SECURITY." Annals of “Dunarea de Jos“ University of Galati. Fascicle III, Electrotechnics, Electronics, Automatic Control, Informatics 45, no. 1 (February 21, 2023): 7. http://dx.doi.org/10.35219/eeaci.2022.1.02.

Full text
Abstract:
In this paper, we present a comprehensive taxonomy of the most popular authentication mechanisms, the main threats, vulnerabilities, the possible types of attacks and the security issues that are associated with computer systems. Our main contribution is to analyze the architecture of the current security environment from all aspects and to make a comparative assessment of different authentication methods in order to identify and develop a scalable and reliable mechanism that must deal with multi-level security and strong authentication requirements. We propose hybrid methods of authentication, which combine and integrate biometric technologies with cryptographic asymmetric algorithms, elements that play a vital role in the field of information security and aim to resolve the shortcomings of traditional methods of authentication and enhance the level of security.
APA, Harvard, Vancouver, ISO, and other styles
50

Junca Paredes, John Jairo, Jesús Fernando Florez, Karen Johanna Enciso Valencia, Luís Miguel Hernández Mahecha, Natalia Triana Ángel, and Stefan Burkart. "Potential Forage Hybrid Markets for Enhancing Sustainability and Food Security in East Africa." Foods 12, no. 8 (April 10, 2023): 1607. http://dx.doi.org/10.3390/foods12081607.

Full text
Abstract:
The cattle sector is strategic for both the economic development and food security of Africa, but the low availability and quality of forage puts the most vulnerable population at risk. Hybrid forages are an alternative for enhancing both food security and sustainability of the sector but adoption levels are still low in Africa, which is related to various factors such as the availability of seeds. This document analyzes potential markets for new interspecific hybrids of Urochloa and potential hybrids of Megathyrsus maximus, adapted to the environmental conditions of eastern and partially western Africa, applying a four-step methodology based on estimating (i) required forage amounts for each country according to its dairy herd, (ii) potential hectares for forage cultivation based on (i), (iii) hectares that can be covered by the two hybrids of interest according to a Target Population of Environment approach, and (iv) potential market values for each country and hybrid. The results show a potential market of 414,388 ha for new interspecific hybrids of Urochloa and 528,409 ha for potential hybrids of Megathyrsus maximus, with approximate annual values of 73.5 and 101.1 million dollars, respectively. Ethiopia, Tanzania, and Kenya hold a market share of 70% for Urochloa, and South Sudan, Ethiopia, and Tanzania a 67% market share for Megathyrsus maximus. The results will help different actors in decision-making, i.e., regarding private sector investments in forage seed commercialization or public sector incentives supporting adoption processes, and thus contribute to increasing food security and sustainability in the region.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography