Abstract
In this paper will be presented factors connected with creation of secure user-oriented security systems. In particular the ways of application personal features and characteristics in defining modern security protocols will be presented. Using personal information allow to make such systems useful in prevention of information leakage as well as resist against cyberattacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ogiela, L., Ogiela, M.R.: Cognitive security paradigm for cloud computing applications. Concurr. Comput.: Pract. Exp. 32(8), e5316 (2020). https://doi.org/10.1002/cpe.5316
Ogiela, M.R., Ogiela, L., Ogiela, U.: Biometric methods for advanced strategic data sharing protocols. In: 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing IMIS 2015, pp. 179–183 (2015). https://doi.org/10.1109/IMIS.2015.29
Ogiela, M.R., Ogiela, U.: Secure information splitting using grammar schemes. In: Nguyen, N.T., Katarzyniak, R.P., Janiak, A. (eds.) New Challenges in Computational Collective Intelligence. SCI, vol. 244, pp. 327–336. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03958-4_28
Ogiela, M.R., Ogiela, U., Ogiela, L.: Secure information sharing using personal biometric characteristics. In: Kim, T.-H., Kang, J.-J., Grosky, W.I., Arslan, T., Pissinou, N. (eds.) FGIT 2012. CCIS, vol. 353, pp. 369–373. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-35521-9_54
Nezami, Z.I., Ali, H., Asif, M., Aljuaid, H., Hamid, I., Ali, Z.: An efficient and secure technique for image steganography using a hash function. PeerJ Comput. Sci. 8, e1157 (2022). https://doi.org/10.7717/peerj-cs.1157
Koptyra, K., Ogiela, M.R.: Steganography in IoT: information hiding with APDS-9960 proximity and gestures sensor. Sensors 22(7), 2612 (2022). 1–11. https://doi.org/10.3390/s22072612
Ogiela, M.R., Koptyra, K.: Visual pattern embedding in multi-secret image steganography. In: ICIIBMS 2015 - International Conference on Intelligent Informatics and BioMedical Sciences, 28–30 November 2015, Okinawa, Japan, pp. 434–437. IEEE (2015). ISBN 978-1-4799-8562-3/15
Ogiela, L.: Transformative computing in advanced data analysis processes in the cloud. Inf. Process. Manag. 57(5), 102260 (2020)
Pizzolante, R., Carpentieri, B., Castiglione, A., Castiglione, A., Palmieri, F.: Text compression and encryption through smart devices for mobile communication. In: Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 672–677 (2013). https://doi.org/10.1109/IMIS.2013.121
Acknowledgments
Research project supported by program „Excellence initiative – research university” for the AGH University of Science and Technology. This work has been partial supported by the funds of the Polish Ministry of Education and Science assigned to AGH University of Science and Technology.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Ogiela, M.R., Ogiela, U. (2023). User-Oriented Cybersecurity Systems. In: Barolli, L. (eds) Advanced Information Networking and Applications. AINA 2023. Lecture Notes in Networks and Systems, vol 654. Springer, Cham. https://doi.org/10.1007/978-3-031-28451-9_37
Download citation
DOI: https://doi.org/10.1007/978-3-031-28451-9_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-28450-2
Online ISBN: 978-3-031-28451-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)