Search results for "nTOF"

showing 10 items of 75 documents

The importance of management innovation and consultant services on ERP implementation success

2011

Enterprise resource planning (ERP) implementation has been an important activity for improving efficiency. However, an ERP system is a critical investment that can significantly affect future performance of a company. Many ERP projects report an unusually high failure rate. This study empirically investigates the involvement of management consultants in ERP implementation success. The results from our field survey of 134 ERP end-users in Spanish ceramic tile companies show that ERP implementation success significantly depends on the quality of consultant services. The results also indicate the importance of internal management throughout the learning process. Overall, these findings contrib…

Process managementbusiness.industryEnd userProcess (engineering)Strategy and Managementmedia_common.quotation_subjectInvestment (macroeconomics)Affect (psychology)ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSManagement of Technology and InnovationOrganizational learningInformation systemQuality (business)Operations managementbusinessEnterprise resource planningmedia_commonThe Service Industries Journal
researchProduct

Domain Generation Algorithm Detection Using Machine Learning Methods

2018

A botnet is a network of private computers infected with malicious software and controlled as a group without the knowledge of the owners. Botnets are used by cybercriminals for various malicious activities, such as stealing sensitive data, sending spam, launching Distributed Denial of Service (DDoS) attacks, etc. A Command and Control (C&C) server sends commands to the compromised hosts to execute those malicious activities. In order to avoid detection, recent botnets such as Conficker, Zeus, and Cryptolocker apply a technique called Domain-Fluxing or Domain Name Generation Algorithms (DGA), in which the infected bot periodically generates and tries to resolve a large number of pseudorando…

Pseudorandom number generatorDomain generation algorithmAlphanumericComputer sciencebusiness.industryDomain Name SystemComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSBotnetDenial-of-service attackMachine learningcomputer.software_genreComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSCryptoLockerMalwareArtificial intelligencebusinesscomputer
researchProduct

An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees

2015

Attribute-based authentication (ABA) is a way to authenticate signers by means of attributes and it requests proof of possessing required attributes from the one to be authenticated. To achieve the property of traceability, required attributes should be combined with the signer’s attribute private keys in order to generate a signature. In some schemes, signers’ attribute keys are related to attribute trees, so changing attribute trees will cause the regeneration of all related attribute keys. In this paper, we propose an efficient traceable ABA scheme, where the generation of signers’ attribute keys is independent from attribute trees. Thus the same set of attribute keys can be used with a …

Scheme (programming language)AuthenticationProperty (philosophy)Theoretical computer scienceTraceabilityDatabaseComputer scienceAuthentication schemecomputer.software_genreSignature (logic)Set (abstract data type)ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSAttribute treecomputercomputer.programming_language
researchProduct

An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment

2019

We propose an efficient anonymous, attribute-based credential scheme capable of provisioning multi-level credential delegations. It is integrated with a mechanism to revoke the anonymity of credentials for resolving access disputes and making users accountable for their actions. The proposed scheme has a lower end-user computational complexity in comparison to existing credential schemes with delegatability and has a comparable level of performance with the credential standards of U-Prove and Idemix. Furthermore, we demonstrate how the proposed scheme can be applied to a collaborative e-health environment to provide its users with the necessary anonymous access with delegation capabilities.

Scheme (programming language)Computational complexity theoryDelegationComputer Networks and CommunicationsComputer sciencemedia_common.quotation_subject020206 networking & telecommunicationsProvisioning02 engineering and technologyComputer securitycomputer.software_genreCredentialComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS0202 electrical engineering electronic engineering information engineeringComputingMilieux_COMPUTERSANDSOCIETYcomputermedia_commoncomputer.programming_languageAnonymityACM Transactions on Internet Technology
researchProduct

Honeypot Utilization for Network Intrusion Detection

2018

For research purposes, a honeypot is a system that enables observing attacker’s actions in different phases of a cyberattack. In this study, a honeypot called Kippo was used to identify attack behavior in Finland. The gathered data consisted of dictionary attack login attempts, attacker location, and actions after successful login. From the data, attacker behavior was analyzed. Differentiating bots from human actors, linking scanning activity to further attack steps, and identifying malware and tracking malware sites were all done. The knowledge gained could be used to enhance an organization’s cyber resiliency by identifying attacker motivations and the tools used. Automating analysis of h…

Software_OPERATINGSYSTEMSDictionary attackHoneypotComputer science020206 networking & telecommunications02 engineering and technology021001 nanoscience & nanotechnologycomputer.software_genreComputer securityLoginComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS0202 electrical engineering electronic engineering information engineeringMalwareNetwork intrusion detection0210 nano-technologycomputerSecurity system
researchProduct

Too many passwords? How understanding our memory can increase password memorability

2018

Abstract Passwords are the most common authentication mechanism, that are only increasing with time. Previous research suggests that users cannot remember multiple passwords. Therefore, users adopt insecure password practices, such as password reuse in response to their perceived memory limitations. The critical question not currently examined is whether users’ memory capabilities for password recall are actually related to having a poor memory. This issue is imperative: if insecure password practices result from having a poor memory, then future password research and practice should focus on increasing the memorability of passwords. If, on the other hand, the problem is not solely related …

Software_OPERATINGSYSTEMSinformation securityComputer scienceInternet privacymetamemoryHuman Factors and ErgonomicsContext (language use)02 engineering and technologyEducationPassword strength020204 information systems0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencestietoturvaPassword psychology050107 human factorsmuisti (kognitio)human memoryta113PasswordAuthenticationmemorabilityCognitive passwordbusiness.industry05 social sciencesGeneral EngineeringsalasanatHuman-Computer InteractionComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSpassword securitytodentaminenHardware and ArchitectureauthenticationbusinessSoftwareInternational Journal of Human-Computer Studies
researchProduct

Improving Password Memorability, While Not Inconveniencing the User

2019

Abstract Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors (e.g., password reuse). Therefore, new and innovative ways are needed to increase password memorability and security. Typically, users are asked to input their passwords once in order to access the system, and twice to verify the password, when they create a new account. But what if users were asked to input their passwords three or four times when they create new accounts? In this study, three groups of participants were asked to verify their passwords once (control group), twice, and three times (two experimental gr…

Software_OPERATINGSYSTEMSpassword security behaviorrepetitionComputer sciencepassword memorabilityHuman Factors and ErgonomicsComputer securitycomputer.software_genreEducationPassword strengthmuistaminenPasswordta113AuthenticationRepetition (rhetorical device)turvallisuusGeneral EngineeringsalasanatHuman-Computer InteractionComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSpassword securityHardware and Architectureuser conveniencekäyttäjäkokemuscomputerpassword verificationSoftwareInternational Journal of Human-Computer Studies
researchProduct

Improving the security of multiple passwords through a greater understanding of the human memory

2016

Multiple passwords are an increasing security issue that will only get worse with time. One of the major factors that compromise multiple passwords is users’ memory, and the behaviors they adopt to compensate for its failures. Through studying memory elements that influence users’ password memorability, we may increase our understanding of the user and therefore make proposals to increase the security of the password authentication mechanism. This dissertation examines the human memory to understand password security behaviors; and moreover, develops new theories and revises prominent memory theories for the password context. This research employs memory theories to not only increase the me…

Software_OPERATINGSYSTEMSrepetitionkäytettävyysuser memorypassword memorabilitymuistiteoriatmetamemoryinterferencepassword reuseunohtaminenmuistisalasanatunique passwordsComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSmetamuistipassword securityuser conveniencemuistaminentietoturvamemory theories
researchProduct

CCDC 1828625: Experimental Crystal Structure Determination

2018

Related Article: Rosaria Bruno, Nadia Marino, Lucia Bartella, Leonardo Di Donna, Giovanni De Munno, Emilio Pardo, Donatella Armentano|2018|Chem.Commun.|54|6356|doi:10.1039/C8CC03544J

Space GroupCrystallographyCrystal SystemCrystal StructureCell Parameterscatena-[tetrakis(mu-4-amino-1-(5-O-phosphonatopentofuranosyl)pyrimidin-2(1H)-one)-hexakis(110-phenanthroline)-tetra-aqua-hepta-copper(ii) hexakis(nitrate) D-aspartic acid solvate hydrate]Experimental 3D Coordinates
researchProduct

CCDC 1828624: Experimental Crystal Structure Determination

2018

Related Article: Rosaria Bruno, Nadia Marino, Lucia Bartella, Leonardo Di Donna, Giovanni De Munno, Emilio Pardo, Donatella Armentano|2018|Chem.Commun.|54|6356|doi:10.1039/C8CC03544J

Space GroupCrystallographyCrystal SystemCrystal StructureCell Parameterscatena-[tetrakis(mu-4-amino-1-(5-O-phosphonatopentofuranosyl)pyrimidin-2(1H)-one)-hexakis(110-phenanthroline)-tetra-aqua-hepta-copper(ii) hexakis(nitrate) hydrate]Experimental 3D Coordinates
researchProduct