Research Methods for Cyber Security 2017
DOI: 10.1016/b978-0-12-805349-2.00002-9
|View full text |Cite
|
Sign up to set email alerts
|

Science and Cyber Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
54
0
4

Year Published

2017
2017
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 61 publications
(58 citation statements)
references
References 0 publications
0
54
0
4
Order By: Relevance
“…A hash function is a computational method that can map an indeterminate size of data into a fixed size of data. A cryptographic hash function uses one-way mathematical functions which are easy to calculate to generate a hash value from the input, but very difficult to reproduce the input by performing calculations on the generated hash [40]. Arora utilized the cryptographic hash function to check the instruction integrity [24].…”
Section: Bb Integrity Checkingmentioning
confidence: 99%
“…A hash function is a computational method that can map an indeterminate size of data into a fixed size of data. A cryptographic hash function uses one-way mathematical functions which are easy to calculate to generate a hash value from the input, but very difficult to reproduce the input by performing calculations on the generated hash [40]. Arora utilized the cryptographic hash function to check the instruction integrity [24].…”
Section: Bb Integrity Checkingmentioning
confidence: 99%
“…Firewalls, system event logs, antivirus software, packet captures, net flow collectors, and intrusion detection systems are examples of common cyberspace sensors. 6 Level-two technologies generate information from the data to determine a current situation. Generally, level-two technologies require the bringing together of data and performing some level of analytics.…”
Section: Security Management and Governancementioning
confidence: 99%
“…Cyber-threat intelligence provides information on active threat actor methods, techniques, and targets providing some level of predictive information to enable taking pre-emptive security measures. 6 Artificial intelligence for cybersecurity develops with high speed and offers new possibilities for better SA.…”
Section: Security Management and Governancementioning
confidence: 99%
“…In the subsequent hardware postprocessing, SRAM is repeatedly powered on to get true random bitstreams continuously. During each power-on cycle, every n bits of power-on values are integrated into one block, which is conditioned into a 256-bit true random string with full entropy (i.e., the amount of entropy in the string is equal to its length [20,29]) by means of SHA-256 hash function. In order for the output string of SHA-256 to have full entropy (256 bits), the amount of entropy at the input of the hash function should be at least 256 bits [19,30].…”
Section: Proposed Sram-based Trng Schemementioning
confidence: 99%