Dernières publications et brevets sur la sécurité de l'information (InfoSec)

Conseil : suite à cette sélection sur l'aéronautique, vous pouvez rechercher et filtrer nos :
    * Outil de recherche de publications gratuit par auteur, sujet, mots-clés, date ou revue.
    * outil gratuit de recherche de brevets * pour les brevets en anglais de l'Office européen des brevets.

This is our latest selection of worldwide publications and patents in english on Information Security (InfoSec), between many scientific online journals, classified and focused on information security, infosec, ransomware, authentication, phishing, malware, firewall, encryption, intrusion detection, intrusion prevention, zero-day exploit, multi-factor authentication, public key, private key, access control, denial of service, social engineering, security awareness, encryption, CIA triad, antivirus and cipher.

Embedding Security Awareness into a Blockchain-Based Dynamic Access Control Framework for the Zero Trust Model in Distributed Systems

Published on 2025-03-11 by Avoy Mohajan, Sharmin Jahan @MDPI

Abstract: The Zero Trust (ZT) model is pivotal in enhancing the security of distributed systems by emphasizing rigorous identity verification, granular access control (AC), and continuous monitoring. To address the complexity and scalability challenges of modern distributed systems, we propose a blockchain-based dynamic access control scheme (DACS) as a practical solution for implementing ZT principles. This framework dynamically manages access control lists (ACLs) and enforces policies through smart cont[...]


Our summary: Enhancing security in distributed systems with a blockchain-based dynamic access control framework that incorporates security awareness for risk assessment and trust evaluation.

blockchain, security awareness, dynamic access control, zero trust

Publication

Comprehensive Study of IoT Vulnerabilities and Countermeasures

Published on 2025-03-11 by Ian Coston, Eadan Plotnizky, Mehrdad Nojoumian @MDPI

Abstract: This comprehensive study provides an in-depth examination of the Internet of Things (IoT), which refers to the interconnection of multiple devices through various wireless protocols that facilitate data transfer and improve operational intelligence. IoT is widely used in numerous fields, including urban infrastructure, domestic settings, transportation systems, military operations, healthcare, and agriculture. However, with its growing prevalence comes a significant increase in security risks ac[...]


Our summary: In-depth examination of IoT vulnerabilities and countermeasures, categorizing risks and exploring mitigation strategies, advancing security in IoT environments.

IoT, vulnerabilities, countermeasures, security

Publication

Takagi–Sugeno–Kang Fuzzy Neural Network for Nonlinear Chaotic Systems and Its Utilization in Secure Medical Image Encryption

Published on 2025-03-11 by Duc Hung Pham, Mai The Vu @MDPI

Abstract: This study introduces a novel control framework based on the Takagi–Sugeno–Kang wavelet fuzzy neural network, integrating brain imitated network and cerebellar network. The proposed controller demonstrates high robustness, making it an excellent candidate for handling intricate nonlinear dynamics, effectively mapping input–output relationships and efficiently learning from data. To enhance its performance, the controller’s parameters are fi[...]


Our summary: Novel control framework based on Takagi-Sugeno-Kang wavelet fuzzy neural network, high robustness, parameters fine-tuned using Lyapunov stability theory, superior learning capabilities and outstanding performance metrics, synchronization technique applied to secure transmission of medical images, experimental results confirm effectiveness and reliability.

Takagi-Sugeno-Kang, Fuzzy Neural Network, Secure Medical Image Encryption, Nonlinear Chaotic Systems

Publication

Development of an Anomaly Classification Model and a Decision Support Tool for Firewall Policy Configuration

Published on 2025-03-10 by Jinyong Park, Byeongjo Park, Tae-Sung Kim @MDPI

Abstract: A firewall is a device that is used generally to prevent cyberattacks and protect internal assets by blocking unauthorized access. Information security managers have many difficulties in managing firewall policies due to errors or anomalies in the policy that are caused by frequent internal and external requests. This paper intends to develop an anomaly classification model to detect anomalies and measure the priority of resolution in firewall policy as well as a visualized tool that supports in[...]


Our summary: Development of Anomaly Classification Model and Decision Support Tool for Firewall Policy Configuration. Detect and prioritize anomalies in firewall policy. Visualized tool for efficient management of firewall policy. Protect internal assets effectively.

Firewall, Anomaly Classification, Decision Support Tool, Policy Configuration

Publication

Utilizing Transformer and SeqGAN for Detecting and Classifying Document Type Malware

Published on 2025-03-10 by Gati Lother Martin, Sang-Min Lee, Jong-Hyun Kim, Young-Seob Jeong, Ah Reum Kang, Jiyoung Woo @MDPI

Abstract: The prevalence of non-executable malware is on the rise, presenting a major threat to users, including major public institutions and corporations. While extensive research has been conducted on detecting malware threats, there is a noticeable gap in studying document-type malware compared with executable files. The proposed model will solve this gap by detecting and classifying document-type malware families using script codes, including tags, to write documents and script languages to execute m[...]


Our summary: Detecting and classifying document-type malware families using script codes, leveraging language models, and addressing class imbalance with a generative adversarial network.

Transformer, SeqGAN, Malware, Document-type

Publication

A Reliable and Privacy-Preserving Framework for Federated Learning-Based IoT Malware Detection

Published on 2025-03-10 by Mohammed Asiri, Maher A. Khemakhem, Reemah M. Alhebshi, Bassma S. Alsulami, Fathy E. Eassa @MDPI

Abstract: The proliferation of Internet of Things (IoT) devices and their vulnerability to malware infections pose critical security challenges in IoT networks and multi-access edge computing (MEC). Traditional federated learning-based IoT malware detection (FL-IMD) methods face limitations in privacy, reliability, and client authentication, necessitating innovative solutions. This study proposes a reliable and privacy-preserving federated learning framework (RPFL) that integrates elliptic curve digital s[...]


Our summary: A study proposes a reliable and privacy-preserving federated learning framework integrating ECDSA, homomorphic encryption, and blockchain technology. Experimental results show RPFL achieves high accuracy in IoT malware detection while enhancing reliability and privacy. RPFL outperforms BCFL in reducing communication costs and latency.

federated learning, IoT malware detection, privacy-preserving framework, reliability

Publication

Network-independent dynamic encryption

Patent published on the 2025-03-06 in WO under Ref WO2025049427 by CONC3AL INC [US] (Ilic Igor [us], Quinn Cary [us], Chase Charles [us], Nastasi Franklin [us])

Abstract: A computer-implemented method to improve the safety of digital documents and assets, including for example digital tickets, may include the steps of: generating a salt/public key by obtaining a longitude and latitude of an event attendee smart device GPS chip and obtaining a time stamp from the smart device operating system; creating a static and unique ID; creating a data carrier/glyph/code, such creating a new quick response code, in intervals using data to be rehashed comprising the unique ID[...]


Our summary: A method for enhancing digital document safety by generating unique IDs and using GPS data to create dynamic encryption codes for validation.

dynamic encryption, digital documents, GPS chip, quick response code

Patent

Audible indicator for access control systems

Patent published on the 2025-03-06 in WO under Ref WO2025050116 by SCHLAGE LOCK COMPANY LLC [US] (Palmer Phillip [us], Stalter John [us], Nagaraju Naveena [in], Lehner Jack [us], Roberts Rockwood [us])

Abstract: A motor assembly is provided that includes an audible indicator for an access control device for a door, such as an exit device or an auto-operator. The audible indicator is configured to provide an audible output in response to a signal that initiates operation of the motor to change a state of a latch or open the door.[...]


Our summary: Motor assembly with audible indicator for access control devices, provides audible output in response to signal, changes state of latch or opens door.

audible indicator, access control systems, motor assembly, exit device

Patent

Table of Contents
    Ajouter un en-tête pour commencer à générer la table des matières

    DESIGN or PROJECT CHALLENGE?
    Mechanical Engineer, Project or R&D Manager
    Développement efficace des produits

    Available for a new challenge on short notice in France & Swiss.
    Contactez-moi sur LinkedIn
    Plastic & metal products, Design-to-cost, Ergonomics, Medium to high-volume, Regulated industries, CE & FDA, CAD, Solidworks, Lean Sigma Black Belt, medical ISO 13485 Class II & III

    Université ?
    Institution ?

    Vous souhaitez devenir partenaire de ce site en l'hébergeant ?
    > nous envoyer un message <

    Thèmes abordés : anomaly classification, decision support tool, firewall policy, document-type malware, federated learning, IoT malware detection, privacy-preserving framework, cybersecurity threat modeling, solar energy, true random number generator, encryption, randomness, NIST, BSI, STRIDE, DREAD, Keccak.

    fr_FRFR
    Retour en haut