International Scientific Journals
of Scientific Technical Union of Mechanical Engineering "Industry 4.0"

  • Journals
  • Submission
  • Events
  • About us
  • Contact

Keyword: security

  • INFORMATION SECURITY

    Artificial intelligence and data security

    • Teodora Licheva
    Security & Future, Vol. 8 (2024), Issue 3, pg(s) 88-90
    • Abstract
    • View Article
    •  Article PDF

    New technological capabilities are becoming an increasingly important part of our daily lives. If we want to be sustainable and competitive, we as a society must take advantage of them. The huge volume of data cannot be used effectively without the implementation of artificial intelligence algorithms. And to be effective and useful, data must be protected and secure.

  • INFORMATION SECURITY

    Analysis of internet of things security breaches

    • Veselin Tselkov
    Security & Future, Vol. 8 (2024), Issue 3, pg(s) 82-85
    • Abstract
    • View Article
    •  Article PDF

    The report analyzes the nature of the Internet of Things (IoT), presents a basic architectural model of IoT, and categorizes IoT according to various criteria. The most famous IoT security breaches are presented. The vulnerabilities that led to the security breaches and the scale and consequences of the impact of the breach are analyzed. Overview and analysis of IoT security breaches are the subject of this research. The main threats and vulnerabilities are systematize and the response of the world community is tracked

  • INFORMATION SECURITY

    IoT, Security and Privacy

    • Veselin Tselkov
    Security & Future, Vol. 8 (2024), Issue 1, pg(s) 29-30
    • Abstract
    • View Article
    •  Article PDF

    Many of the devices in the IoT group process personal information or information enabling profiling or revealing the identity of natural persons. Naturally, the question of the security of this information and compliance with the legal requirements for the protection of the personal data of natural persons and their inviolability arises. The study defined the main issues related to the protection of personal data, identified threats and risks to the security and privacy of information processed by IoT devices.

  • DOMINANT TECHNOLOGIES IN “INDUSTRY 4.0”

    Preparation and Deployment of Secure Over-The-Air Updates for Embedded Devices: Challenges and Solutions

    • Pavel Palurik
    • Michal Mikulasek
    • Lukas Jabloncik
    Industry 4.0, Vol. 9 (2024), Issue 3, pg(s) 105-109
    • Abstract
    • View Article
    •  Article PDF

    This paper provides a comprehensive overview of the preparation and deployment of secure Over-The-Air (OTA) updates for embedded devices. In the era of intelligent devices, the need for remotely updating software and firmware has become increasingly prevalent. This paper discusses the principles of OTA updates, focusing on the various types used in the field of embedded devices and the complications that need to be resolved for a successful process. Furthermore, it delves into the theoretical description of OTA updates, security mechanisms, and practical implementation. The paper also highlights the main benefits of OTA updates, such as convenience, security, scalability, reduced maintenance costs, and improved performance. Additionally, it addresses the challenges and issues associated with OTA updates, including update reliability, security risks, compatibility, network propagation, and integrity and warranty implications. Overall, this paper serves as a valuable resource for understanding the complexities and importance of OTA updates in the realm of embedded devices.

  • NATIONAL AND INTERNATIONAL SECURITY

    The OSCE’s commitment to counter-terrorism: implications for Bulgaria

    • Antoaneta Simeonova
    • Angel Krumov
    Security & Future, Vol. 7 (2023), Issue 2, pg(s) 44-45
    • Abstract
    • View Article
    •  Article PDF

    The Organization for Security and Co-operation in Europe (OSCE) is dedicated to fostering peace, security, and stability in its member states. Counter-terrorism remains one of its top priorities, with a focus on a comprehensive and collaborative approach. This paper explores the OSCE’s counter-terrorism strategies and their implications for Bulgaria, a participating state. It delves into the collaborative efforts, initiatives, and programs that Bulgaria engages in within the OSCE framework to combat terrorism.

  • TECHNOLOGICAL BASIS OF “INDUSTRY 4.0”

    Using blockchain technology for ID management: a case study for Albania

    • Elva Lleka
    • Luis Lamani
    • Enkeleda Hoxha
    Industry 4.0, Vol. 7 (2022), Issue 6, pg(s) 213-218
    • Abstract
    • View Article
    •  Article PDF

    In this paper we have presented a framework, which proposes to adopt blockchain technology for ID card management in Albania, to increase the security and privacy of personal data. The way how the actual ID cards in Albanian tend to offer security is by using a microprocessor, encrypting the data in the card. However, the centralized data management systems have single points of failure that leave the system vulnerable to attack and operational risks such as: (1) inside hacking, where unauthorized changes of personal information may happen from the inside system; (2) fake digital identities creation or (3) sale of personal identity‟s data to third interested parties. An answer to address the above-mentioned drawbacks is a decentralized identity management system, which calls for a user-centered strategy and returns complete identification control to the individual. Blockchain technology has the potential to revolutionize modern civilizations and their applications. Administrative processes, security, privacy, integrity and confidentiality are some actions that could have an impact. Furthermore, we present an analysis of previous work on blockchain-based identity management and provide a proposal use case applicable in Albania compared to actual implementation.

  • TECHNICAL FACILITIES FOR ENSURING SECURITY

    Principle of Operation and Advantages of a Sensor for Fog Contamination Detection

    • Ognyan Ivanov
    • Petar Todorov
    • José Luis Pérez-Díaz
    • Tihomir Tiankov
    Security & Future, Vol. 6 (2022), Issue 2, pg(s) 84-86
    • Abstract
    • View Article
    •  Article PDF

    During out work in a project related to European security, we have created various devices. One of them is a sensor for control of contaminations in the composition of fogs, which is first of its kind in the world. The development of such a sensor is important because in this project, artificially generated fogs with special additives are used for decontamination, and it is crucial to control the quantity of impurities in these fogs. In this work, different aspects of the operation of this sensor, its advantages and design considerations are discussed.

  • TECHNICAL FACILITIES FOR ENSURING SECURITY

    Technological development: Thermal vision as a phenomenon

    • Pavel Zahradnicek
    • Jan Hrdinka
    • Jan Zezula
    • Ludek Rak
    Security & Future, Vol. 6 (2022), Issue 2, pg(s) 82-83
    • Abstract
    • View Article
    •  Article PDF

    The article deals with technological development, especially with thermal imaging. The authors are convinced, that this technology can progressively and qualitative influence operations of security forces and crisis response teams. The article is divided into 3 main parts, where first chapter generally describes thermal imaging, second chapter deals with current applications and last chapter sets the perspectives for future.

  • TECHNICAL FACILITIES FOR ENSURING SECURITY

    Distributed optical fiber acoustic sensing system for perimeter security

    • Michal Ružička
    • Petr Münster
    • Petr Dejdar
    • Lukáš Jablončík
    Security & Future, Vol. 5 (2021), Issue 4, pg(s) 150-152
    • Abstract
    • View Article
    •  Article PDF

    Distributed fiber optic sensing is known for the few last decades. One of the most interesting area in security field is Distributed Acoustic Sensing (DAS). Nowadays, DAS systems have deployments in many different areas like pipeline monitoring, seismic activity monitoring, or perimeter security monitoring. They can use existing optic fiber networks and create a distributed sensor from this fiber which can monitor areas all acoustic events along the fiber. This paper deals with the evaluation mea surement with a commercial DAS system used for perimeter security. The system was evaluated on university optical fiber test polygon and three different events were classified–man jumping, man walking and car driving along the fiber route. Based on the measurement and another post-processing also the speed of movement can be determined.

  • INFORMATION SECURITY

    Comparison of Methods for Vibration Detection Using Single-Mode Optical Fiber to Ensuring Information Security

    • Petr Dejdar
    • Petr Munster
    • Adrian Tomasov
    • Lukas Jabloncik
    • Michal Ruzicka
    • Tomas Horvath
    Security & Future, Vol. 5 (2021), Issue 4, pg(s) 147-149
    • Abstract
    • View Article
    •  Article PDF

    The paper focuses on the security of fiber optic infrastructures. The main purpose of the paper is present the vibration detection system for unauthorized access to the fiber optic infrastructure detection. For this purpose, measurement of vibrations using the interferometric method and the measurement based on state of polarization changes evaluation is presented. For the measurement own designed systems were used. Both systems are theoretically described and the principles of use are explained. The measurement was performed at an experimental workplace in a laboratory at the university Based on evaluation measurement both systems are compared in term of sensitivity.

  • INFORMATION SECURITY

    A Comparative Analysis of HOTP and TOTP Authentication Algorithms. Which one to choose?

    • Lina Lumburovska
    • Jovana Dobreva
    • Stefan Andonov
    • Hristina Mihajloska Trpcheska,
    • Vesna Dimitrova
    Security & Future, Vol. 5 (2021), Issue 4, pg(s) 131-136
    • Abstract
    • View Article
    •  Article PDF

    Giving the right access, limiting resources, and recognizing a user’s identity are important steps that need to be taken into consideration before entering a certain network. These steps are executed by authentication and authorization. In this paper, we put our focus on authentication algorithms HOTP and TOTP as two algorithms for generating one-time passwords. A one-time password is an automatically generated string of characters – a password that is meant to be used only once. This password is only valid for one login session or transaction. Due to its randomness and usage (only once), it leads to higher security outputs, and that is why this type of password is used in authentication algorithms. We will analyse both algorithms and their working way and will present the obtained results and their usage in practice. The main characteristic is that the HOTP algorithm uses only hash functions and the TOTP algorithm uses time above the hash. To check when each algorithm is better to use, we need to know the given environment and circumstances. In this paper, we will try to answer the question” Which one is better at a particular time?”. Depending on many factors that we analyse through the sections, we are going to make conclusions that will be useful for future planning of good security passwords.

  • NATIONAL AND INTERNATIONAL SECURITY

    Practical approaches for collecting intelligence information

    • Ilin Savov
    Security & Future, Vol. 5 (2021), Issue 2, pg(s) 49-50
    • Abstract
    • View Article
    •  Article PDF

    The report examines and assesses the possibilities for obtaining information for the benefit of the security services. The main practical approaches and their specifics regarding the collection of intelligence informaThe report examines and assesses the possibilities for obtaining information for the benefit of the security services. The  main practical approaches and their specifics regarding the collection of intelligence information are highlighted.tion are highlighted.

  • Previous page
  • You're on page 1
  • 2
  • 3
  • 4
  • Next page

    Congresses and conferences

    • IX International Scientific Conference
      "High Technologies. Business. Society"
      04.-07.03.2024 - Borovets, Bulgaria
    • XXI International Congress
      "Machinеs. Technolоgies. Materials."
      Winter session
      06.-09.03.2024 - Borovets, Bulgaria
    • XIX International Scientific Technical Conference
      "Foundry"
      17.-19.04.2024 - Pleven, Bulgaria
    • XXXI International Scientific Conference
      "trans&MOTAUTO"
      24.-27.06.2024 - Varna, Bulgaria
    • IX International Scientific Congress
      "Innovations"
      24.-27.06.2024 - Varna, Bulgaria
    • IX International Scientific Conference
      "Industry 4.0"
      Summer session
      26.-29.06.2024 - Varna, Bulgaria
    • XII International Scientific Congress
      "Agricultural Machinery"
      26.-29.06.2024 - Varna, Bulgaria
    • XI International Scientific Conference
      "Engineering. Technologies. Education. Safety"
      02.-05.09.2024 - Varna, Bulgaria
    • X International Scientific Conference
      "Materials Science. Non-Equilibrium Phase Transformations"
      02.-05.09.2024 - Varna, Bulgaria
    • XVII International Conference for Young Researchers
      "Technical Sciences. Industrial Management"
      04.-07.09.2024 - Varna, Bulgaria
    • XXI International Congress
      "Machines. Technologies. Materials"
      Summer session
      04.-07.09.2024 - Varna, Bulgaria
    • IX International Scientific Conference
      "Conserving Soils and Water"
      09.-12.12.2024 - Borovets, Bulgaria
    • VIII International Scientific Conference on Security
      "Confsec"
      09.-12.12.2024 - Borovets, Bulgaria
    • IX International Scientific Conference
      "Industry 4.0"
      Winter session
      11.-14.12.2024 - Borovets, Bulgaria
    • VI International Scientific Conference
      "Mathematical Modeling"
      11.-14.12.2024 - Borovets, Bulgaria

    Scientific Technical Union of Mechanical Engineering "Industry-4.0"

    108, Rakovski Str., 1000 Sofia, Bulgaria
    tel. (+359 2) 987 72 90, tel./fax (+359 2) 986 22 40,
    office@stumejournals.com