Volume 15 Number 2 June 2024


Synchronization Processors in the Distributed Multiprocessor Real-time Locking Protocols

Björn B. Brandenburg

https://doi.org/10.6025/jisr/2024/15/2/35-58

Abstract Our research delves into the fascinating world of distributed multiprocessor real-time locking protocols, where resources can only be accessed through certain synchronization processors. We establish the minimum and maximum priority inversion blocking limits that are typically unavoidable in these protocols, building on the foundation laid by previous research on suspension-based shared-memory multiprocessor locking protocols. The W (m) and W (n)... Read More


Impact of Neural Networks on Improving Cloud Computing Security with AI-powered Smart Intrusion Detection

Mohsin Ali, Abdul Razaque, Damelya M. Yeskendirova, Talgat A. Nurlybayev, Nessibeli Y. Askarbekova and Zarina A. Kashaganova

https://doi.org/10.6025/jisr/2024/15/2/59-71

Abstract This work introduces a highly effective method for identifying harmful network activity by leveraging the power of artificial neural networks. These networks, particularly adept at analyzing deep packet inspection-based systems for detecting intrusions, have been the cornerstone of our research. The method was rigorously tested using a diverse range of harmless network data, including images, dynamic link library files, logs,... Read More


A Model to Increase Password Security in Online Personal Profiles And Accounts

Miloš Kostic, Igor Saveljic

https://doi.org/10.6025/jisr/2024/15/2/72-79

Abstract In contemporary culture, individuals increasingly need to manage an ever-expanding array of personal profiles and online accounts. Yet, the level of understanding about the importance of strong password security continues to be a major weakness in cybersecurity. Despite the availability of various tools for password protection, the necessity of teaching users and expanding their awareness about the significance of password... Read More