Latest Publications & Patents on Information Security (InfoSec)
This is our latest selection of worldwide publications and patents in english on Information Security (InfoSec), between many scientific online journals, classified and focused on information security, infosec, ransomware, authentication, phishing, malware, firewall, encryption, intrusion detection, intrusion prevention, zero-day exploit, multi-factor authentication, public key, private key, access control, denial of service, social engineering, security awareness, encryption, CIA triad, antivirus and cipher.
Tip: further to this selection on Information Security (InfoSec), you can search and filter our:
* free publications search tool * by author, topic, keywords, date or journal.
* free patents search tool * for patents in english from the European Patent Office.
Root Cause Analysis for Observed Increased Sedimentation in a Commercial Residue Hydrocracker
Published on 2025-02-27 by Ivelina Shishkova, Dicho Stratiev, Petko Kirov, Rosen Dinkov, Sotir Sotirov, Evdokia Sotirova, Veselina Bureva, Krassimir Atanassov, Vesislava Toteva, Svetlin Vasilev, Dobromir Yordanov, Radoslava Nikolova, Anife Veli @MDPI
Abstract: Ebullated bed vacuum residue hydrocracking is a well-established technology providing a high conversion level of low-value residue fractions in high-value light fuels. The main challenge in this technology when processing vacuum residues derived from different crude oils is the sediment formation rate that leads to equipment fouling and cycle length shortening. With the severity enhancement, the asphaltenes become more aromatic and less soluble which leads to sediment formation when the differen[...]
Our summary: Evaluation of sediment formation in a commercial residue hydrocracker revealed the impact of feed properties and process conditions on the increased sediment content, leading to equipment fouling and cycle length shortening.
Root Cause Analysis, Sedimentation, Hydrocracker, Asphaltene
Publication
Privacy-Preserved Visual Simultaneous Localization and Mapping Based on a Dual-Component Approach
Published on 2025-02-27 by Mingxu Yang, Chuhua Huang, Xin Huang, Shengjin Hou @MDPI
Abstract: Edge-assisted visual simultaneous localization and mapping (SLAM) is widely used in autonomous driving, robot navigation, and augmented reality for environmental perception, map construction, and real-time positioning. However, it poses significant privacy risks, as input images may contain sensitive information, and generated 3D point clouds can reconstruct original scenes. To address these concerns, this paper proposes a dual-component privacy-preserving approach for visual SLAM. First, a priv[...]
Our summary: This paper presents a dual-component privacy-preserving approach for visual SLAM, combining object detection and image inpainting for privacy protection and an encryption algorithm for 3D point cloud data. The proposed method effectively safeguards privacy-sensitive information while maintaining accurate pose estimation in dynamic outdoor scenes and prevents unauthorized attacks on recovering the original point cloud.
Privacy-Preserved, Visual SLAM, Dual-Component Approach, Privacy Protection
Publication
A Secure and Lightweight Group Mobility Authentication Scheme for 6LoWPAN Networks
Published on 2025-02-27 by Fatma Foad Ashrif, Elankovan A. Sundararajan, Mohammad Kamrul Hasan, Rami Ahmad @MDPI
Abstract: The integration of Internet Protocol version 6 over Low-Power Wireless Personal Area Networks (6LoWPANs) provided IP technologies within wireless sensor networks that dramatically increased the Internet of Things (IoT). Therefore, to facilitate efficient mobility management for resource-constrained IP-based sensor nodes, the Proxy Mobile IPv6 (PMIPv6) standard has been introduced to reduce communication overhead. However, the standard has addressed security and mobility authentication challenges[...]
Our summary: Secure and Lightweight Group Mobility Authentication Scheme proposed for 6LoWPAN networks utilizes innovative security measures to ensure efficient and secure communication for highly constrained sensor nodes, addressing challenges in mobility management and group handovers while maintaining privacy and reducing overhead.
6LoWPAN, Group Mobility, Authentication Scheme, IoT
Publication
Modular Neural Network Model for Biometric Authentication of Personnel in Critical Infrastructure Facilities Based on Facial Images
Published on 2025-02-27 by Oleksandr Korchenko, Ihor Tereikovskyi, Ruslana Ziubina, Liudmyla Tereikovska, Oleksandr Korystin, Oleh Tereikovskyi, Volodymyr Karpinskyi @MDPI
Abstract: The widespread implementation of neural network tools for biometric authentication based on facial and iris images at critical infrastructure facilities has significantly increased the level of security. However, modern requirements dictate the need to modernize these tools to increase resistance to spoofing attacks, as well as to provide a base for assessing the compliance of the psycho-emotional state of personnel with job responsibilities, which is difficult to ensure using traditional monoli[...]
Our summary: Development of a modular neural network model for biometric authentication of personnel in critical infrastructure facilities based on facial images, increasing security and resistance to spoofing attacks, and assessing psycho-emotional state of personnel.
Neural Network, Biometric Authentication, Modular Model, Facial Images
Publication
Ensemble Learning for Network Intrusion Detection Based on Correlation and Embedded Feature Selection Techniques
Published on 2025-02-25 by Ghalia Nassreddine, Mohamad Nassereddine, Obada Al-Khatib @MDPI
Abstract: Recent advancements across various sectors have resulted in a significant increase in the utilization of smart gadgets. This augmentation has resulted in an expansion of the network and the devices linked to it. Nevertheless, the development of the network has concurrently resulted in a rise in policy infractions impacting information security. Finding intruders immediately is a critical component of maintaining network security. The intrusion detection system is useful for network security beca[...]
Our summary: New approach for network intrusion detection based on ensemble learning and feature selection techniques, tested on NSL-KDD and CIC-IDS datasets, achieving 99.99% accuracy.
Ensemble Learning, Network Intrusion Detection, Correlation, Embedded Feature Selection
Publication
Genetic Diversity in Apricot Orchards Across Key Growing Regions in Slovakia and Austria, Along with Cultivar Authentication of Apricot Genotypes Found in the Market
Published on 2025-02-25 by Martina Hudcovicová, Lenka Kl?ová, Marcela Gubišová, Jozef Gubiš, Erika Zetochová, Micha Horacek, Ján Kraic, Michaela Havrlentová, Katarína Ondrei?ková @MDPI
Abstract: This study was aimed at evaluating the genetic diversity and authentication of apricot cultivars from Slovak and Austrian orchards. Eleven highly polymorphic SSR markers were used to analyse 53 apricot genotypes. A high level of genetic diversity was observed, with a mean of 13 alleles per locus and a mean expected heterozygosity of 0.811. The most polymorphic locus, UDP97-402, exhibited a probability of identity of 0.025, indicating a high discriminatory power. Differentiation analyses revealed[...]
Our summary: Evaluation of genetic diversity and cultivar authentication in Slovak and Austrian apricot orchards using SSR markers. High level of genetic diversity observed with distinct groupings based on geographical origin and pedigree. SSR markers effective in identifying cultivars and detecting mislabelled samples.
genetic diversity, cultivar authentication, SSR markers, apricot orchards
Publication
Method for performing verification by using shared key, method for performing verification by using public key and private key, and apparatus
Patent published on the 2025-02-19 in EP under Ref EP4510502 by HUAWEI TECH CO LTD [CN] (He Chengdong [cn], Li Hua [cn])
Abstract: A method for performing verification by using a shared key, a method for performing verification by using a public key and a private key, and an apparatus are disclosed. The method for performing verification by using a shared key includes: receiving, by a first network element, a registration request message from a second network element, where the registration request message includes a user identifier, first network identifier information, and second network identifier information, the second[...]
Our summary: Method for performing verification using shared key, public key, and private key. Verification method includes receiving registration request, verifying with shared key, and sending response message.
verification, shared key, public key, private key
Patent
Split packet router for time sensitive networking
Patent published on the 2025-02-19 in EP under Ref EP4510527 by INTEL CORP [US] (Kasichainula Kishore [us])
Abstract: A network interface device for implementing scheduling for time sensitive networking includes a network interface device comprising media access control (MAC) circuitry, including a priority router to parse a packet payload to determine a priority value; determine a corresponding traffic class based on the priority value from the packet payload; and route the packet payload to one of a plurality of traffic class-based packet buffers based on the traffic class; and a packet router to: retrieve a [...]
Our summary: Split packet router for time sensitive networking, network interface device with priority router and packet router, implements scheduling for time sensitive networking.
packet router, time sensitive networking, network interface device, scheduling
Patent
How useful was this post?
Click on a star to rate it!
Average rating 5 / 5. Vote count: 1
No votes so far! Be the first to rate this post.
We are sorry that this post was not useful for you!
Let us improve this post!
Tell us how we can improve this post?