Security Aspect

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 36270 Experts worldwide ranked by ideXlab platform

Mohsen Guizani - One of the best experts on this subject based on the ideXlab platform.

  • Drone-Assisted Public Safety Networks: The Security Aspect
    IEEE Communications Magazine, 2017
    Co-Authors: Daojing He, Sammy Chan, Mohsen Guizani
    Abstract:

    Public safety networks are based on wireless communication technologies, and are particularly important in field operations to support the mobility of first responders. With enhanced functionalities and capabilities, unmanned aerial vehicles, commonly referred to as drones, can be equipped with communication hardware and sent to suitable positions in the field to augment the operation of public safety networks. Security is of primary importance in such drone-assisted public safety networks because sensitive or critical information could be transmitted among these network entities. This article examines the cyber Security issues of such networks.

  • Small data dissemination for wireless sensor networks: The Security Aspect
    IEEE Wireless Communications, 2014
    Co-Authors: Daojing He, Sammy Chan, Mohsen Guizani
    Abstract:

    In wireless sensor networks small data dissemination protocols are used to adjust configuration parameters of sensors, or distribute management commands and queries to sensors. For Security reasons every disseminated data item should be authenticated to prevent an adversary from installing malicious data items in the network. Unfortunately, Security is not among the design considerations of existing small data dissemination protocols. In this article we identify the Security vulnerabilities of these protocols and review a recently proposed solution addressing this issue. Furthermore, we suggest an enhancement to this solution to make the Security function more efficient.

Daojing He - One of the best experts on this subject based on the ideXlab platform.

  • Drone-Assisted Public Safety Networks: The Security Aspect
    IEEE Communications Magazine, 2017
    Co-Authors: Daojing He, Sammy Chan, Mohsen Guizani
    Abstract:

    Public safety networks are based on wireless communication technologies, and are particularly important in field operations to support the mobility of first responders. With enhanced functionalities and capabilities, unmanned aerial vehicles, commonly referred to as drones, can be equipped with communication hardware and sent to suitable positions in the field to augment the operation of public safety networks. Security is of primary importance in such drone-assisted public safety networks because sensitive or critical information could be transmitted among these network entities. This article examines the cyber Security issues of such networks.

  • Small data dissemination for wireless sensor networks: The Security Aspect
    IEEE Wireless Communications, 2014
    Co-Authors: Daojing He, Sammy Chan, Mohsen Guizani
    Abstract:

    In wireless sensor networks small data dissemination protocols are used to adjust configuration parameters of sensors, or distribute management commands and queries to sensors. For Security reasons every disseminated data item should be authenticated to prevent an adversary from installing malicious data items in the network. Unfortunately, Security is not among the design considerations of existing small data dissemination protocols. In this article we identify the Security vulnerabilities of these protocols and review a recently proposed solution addressing this issue. Furthermore, we suggest an enhancement to this solution to make the Security function more efficient.

Yinglin Wang - One of the best experts on this subject based on the ideXlab platform.

  • a linear classifier based approach for identifying Security requirements in open source software development
    Journal of Industrial Information Integration, 2019
    Co-Authors: Wentao Wang, Kavya Reddy Mahakala, Arushi Gupta, Nesrin Hussein, Yinglin Wang
    Abstract:

    Abstract There are several Security requirements identification methods proposed by researchers in up-front requirements engineering (RE). However, in open source software (OSS) projects, developers use lightweight representation and refine requirements frequently by writing comments. They also tend to discuss Security Aspect in comments by providing code snippets, attachments, and external resource links. Since most Security requirements identification methods in up-front RE are based on textual information retrieval techniques, these methods are not suitable for OSS projects or just-in-time RE. In this study, we proposed a linear based approach to identify Security requirements. It first uses logistic regression models (RMs) to calculate feature values for requirements in OSS project. Then it uses the linear combination of all feature values to classify Security and non-Security requirements Our results show that compares to single RMs, our approach can achieve higher recall and precision.

  • a regression model based approach for identifying Security requirements in open source software development
    2017 IEEE 25th International Requirements Engineering Conference Workshops (REW), 2017
    Co-Authors: Wentao Wang, Arushi Gupta, Nesrin Hussein, Yinglin Wang
    Abstract:

    There are several Security requirements identification methods proposed by researchers in up-front requirements engineering (RE). However, in open source software (OSS) projects, developers use lightweight representation and refine requirements frequently by writing comments. They also tend to discuss Security Aspect in comments by providing code snippets, attachments, and external resource links. Since most Security requirements identification methods in up-front RE are based on textual information retrieval techniques, these methods are not suitable for OSS projects or just-in-time RE. In our study, we propose a new model based on logistic regression to identify Security requirements in OSS projects. We used five metrics to build Security requirements identification models and tested the performance of these metrics by applying those models to three OSS projects. Our results show that four out of five metrics achieved high performance in intra-project testing.

Sammy Chan - One of the best experts on this subject based on the ideXlab platform.

  • Drone-Assisted Public Safety Networks: The Security Aspect
    IEEE Communications Magazine, 2017
    Co-Authors: Daojing He, Sammy Chan, Mohsen Guizani
    Abstract:

    Public safety networks are based on wireless communication technologies, and are particularly important in field operations to support the mobility of first responders. With enhanced functionalities and capabilities, unmanned aerial vehicles, commonly referred to as drones, can be equipped with communication hardware and sent to suitable positions in the field to augment the operation of public safety networks. Security is of primary importance in such drone-assisted public safety networks because sensitive or critical information could be transmitted among these network entities. This article examines the cyber Security issues of such networks.

  • Small data dissemination for wireless sensor networks: The Security Aspect
    IEEE Wireless Communications, 2014
    Co-Authors: Daojing He, Sammy Chan, Mohsen Guizani
    Abstract:

    In wireless sensor networks small data dissemination protocols are used to adjust configuration parameters of sensors, or distribute management commands and queries to sensors. For Security reasons every disseminated data item should be authenticated to prevent an adversary from installing malicious data items in the network. Unfortunately, Security is not among the design considerations of existing small data dissemination protocols. In this article we identify the Security vulnerabilities of these protocols and review a recently proposed solution addressing this issue. Furthermore, we suggest an enhancement to this solution to make the Security function more efficient.

Stewart Kowalski - One of the best experts on this subject based on the ideXlab platform.

  • an empirical study of Security culture in open source software communities
    Advances in Social Networks Analysis and Mining, 2019
    Co-Authors: Shaofang Wen, Mazaher Kianpour, Stewart Kowalski
    Abstract:

    Open source software (OSS) is a core part of virtually all software applications today. Due to the rapidly growing impact of OSS on society and the economy, the Security Aspect has attracted researchers' attention to investigate this distinctive phenomenon. Traditionally, research on OSS Security has often focused on technical Aspects of software development. We argue that these Aspects are important, however, technical Security practice considering different social Aspects of OSS development will assure the effectiveness and efficiency of the implementation of the tool. To mitigate this research gap, in this empirical study, we explore the current Security culture in the OSS development phenomenon using a survey instrument with six evaluation dimensions: attitude, behavior, competency, subjective norms, governance, and communication. By exploring the current Security culture in OSS communities, we can start to understand the influence of Security on participants' Security behaviors and decision-making, so that we can make realistic and practical suggestions. In this paper, we present the measurements of Security culture adopted in the study and discuss corresponding Security issues that need to be addressed in OSS communities.