The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A wireless monitoring system for cyclists is considered. The system comprises three parts: heart rate data collection, bike speed control, and cloud computing. All three parts are integrated by a smartphone that exchanges information among the subsystems. In practice, the monitoring system can control the bike speed according to users' physical conditions in real time to enhance the users' experiences.
Internet Threat Monitoring (ITM) systems have been widely deployed to detect and characterize dangerous Internet global threats such as botnet and malware propagation. Nonetheless, the effectiveness of ITM systems largely depends on the confidentiality of their monitor locations. In this paper, we investigate localization attacks aiming to identify ITM monitor location and propose the formal model...
Tactical Mobile Ad Hoc Network (MANET) demands a robust, diverse, and resilient protected communication and computing environment enabling network-centric operation with minimal downtime. Nevertheless, the nature of MANET causes security risks because mobile nodes are deployed in the open field and wireless communication makes the information accessible by anyone. Conducting cyber attack monitoring...
In Cyber-Physical Networked Systems (CPNS), attackers could inject false measurements to the controller through compromised sensor nodes, which not only threaten the security of the system, but also consumes network resources. To deal with this issue, a number of en-route filtering schemes have been designed for wireless sensor networks. However, these schemes either lack resilience to the number...
This study proposes a customized and reusable component-based design framework based on the UML modeling process for intelligent home healthcare systems. All the proposed functional components are reusable, replaceable, and extensible for the system developers to implement customized home healthcare systems for different demands of patients and caregivers on healthcare monitoring aspects. The prototype...
People are benefiting tremendously from pervasively deployed WiFi networks. However, criminals may exploit the anonymity of WiFi communication and wireless routers to access illegal content such as child porn videos. It's becoming an urgent topic as regards to how to preserve and acquire network forensic data from household and small business wireless routers in order to track down criminals. In this...
"The Marauder's Map" is a magical map in J. K. Rowling's fantasy series, "Harry Potter and the Prisoner of Azkaban". It shows all moving objects within the boundary of the "Hogwarts School of Witchcraft and Wizardry". In this paper, we introduce a similar attack to location privacy in wireless networks. Our system, namely the digital Marauder's map, can reveal the locations...
With the increase of the non-liner power loads and impact loads in power systems, the pollution of power quality is becoming more serious. It is important to put up multi-dimensional monitoring and construct monitoring network. In this paper the hardware and software scheme of a new power quality monitoring terminal based on configuration software is introduced in detail, which is applied to different...
In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack, which can accurately and invisibly localize monitors of Internet threat monitoring (ITM) systems, a class of widely deployed facilities to characterize Internet threats, such as worm propagation, denial-of-service (DoS) attacks. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with...
During the past few years, various traffic forecasting models have been developed to monitor traffic in network. However, these strategies rest on the assumption that the pattern that has been identified will continue into the future. Such these strategies cannot be expected to give good predictions unless this assumption is valid. In this paper, we combine an ARIMA model and SVM model for obtaining...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.