
A Chaos-Based Encryption Algorithm for Database System
Abstract: This paper introduces a new Database Transposition, Substitution and XORing Algorithm (DTSXA) based on using chaotic maps. It is

Balancing New Technologies and Ease of Use in Infrastructure Cybersecurity Programs
The importance of cybersecurity in critical infrastructure was first recognized in the power industry with the creation of North American

Construction of a Smart City Network Information Security Evaluation Model Based on GRA-BPNN
Abstract: In this study, we propose an optimized network information security evaluation GRA-BPNN model based on gray correlation analysis method

Using OAuth2 to Secure Your APIs
APIs (Application Programming Interfaces) are gradually becoming critical aspects of software interaction and integration over the internet, allowing fast and

Cybersecurity Strategies for SMEs in the Nordic Baltic Region
Abstract: Cybercrime has become the most widespread kind of economic fraud and is a serious challenge for businesses around the