The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we show a class of relationships which link Discrete Cosine Transforms (DCT) and Discrete Sine Transforms (DST) of types V, VI, VII and VIII, which have been recently considered for inclusion in the future video coding technology. In particular, the proposed relationships allow to compute the DCT-V and the DCT-VIII as functions of the DCT-VI and the DST-VII respectively, plus simple...
This work analyses the actual throughput of the Discrete Sine Transform (DST) stage in a realistic HEVC encoder, which executes the rate-distortion optimization algorithm to achieve high compression quality. Then, a low complexity DST factorization, where all the integer multiplications are substituted with add-and-shift operations, is exploited to design an efficient 1D-DST core. The proposed 1D-DST...
Emulation test beds are increasingly used to study the Internet. In this paper we briefly review various characteristics of a test bed based on the Emulab software that are necessary to conduct scientifically rigorous experiments: experiment fidelity and repeatability as well as measurement accuracy and interference. Our results indicate that the current trend of using emulation test beds is justified...
The security of SCADA systems is one of the most pressing subjects in industrial systems, especially for those installation actively using the public network in order to provide new features and services. In this paper we present an innovative approach to the design of Filtering Systems based on the state analysis of the system being monitored. The aim is to detect attacks composed of a set of “SCADA”...
Studying the resilience of complex systems and Critical Infrastructures (CI), e.g., the Internet, in order to improve protection and response mechanisms is an important research activity due to their vital role in modern economy and society. Such studies are frequently based on experimentation using a) real systems, b) software simulation or c) hardware emulation. In this paper we present how our...
The increasing use of experimental platforms for networking research is due to their ability to support experimentation with complex systems, like the Internet, that simplistic simulators and small scale testbeds fail to reproduce. Therefore many projects and research initiatives have spawned - mainly in the field of Future Internet architectures. Although numerous publications can be found, most...
Industrial systems are nowadays exposed to new kinds of malicious threats. The cause of this is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of ICT and networking technologies for the operation and monitoring of such complex systems. Several scientific works, have showed how supervisory control and data acquisition systems (SCADA),...
The security assessment of the ICT components of critical infrastructures is nowadays a prominent problem. Risk assessment methodologies require, in order to be effective, to be fed with data regarding the functioning and the behavior of the system under analysis, the potential vulnerabilities, the results and the effects of the possible cyber-attacks etc. Unfortunately the availability of security...
The increasing complexity of information and telecommunications systems and networks is reaching a level beyond human ability, mainly from the security assessment viewpoint. Methodologies currently proposed for managing and assuring security requirements fall short of industrial and societal expectations. The statistics about vulnerabilities and attacks show that the security, reliability and availability...
Industry, in parallel with a pervasive use of information and communication technologies, has begun in the last years to take into consideration the use of public information infrastructures (including the Internet) for remotely monitoring, managing and maintaining their technical systems. Concurrently, private and public networks are used for interconnecting technical and business information systems...
The vulnerability of critical infrastructures has become a key-concern in recent years. The faults (in particular as consequences of malicious attacks) may be both ??physical??, regarding system components, and ??cyber??, regarding information/communication system. Simultaneous attacks to different components, both physical and cyber, may be possible. In this context the identification and rank of...
Critical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric...
Since the malicious threats are concerned widely around the world, authorities are keen to implement adequate countermeasures against the malicious attacks, in which the information plays a very important role. In this paper, the problem of the risk analysis of malicious attacks against the power system is addressed with particular consideration of the information. Due to the strategic interaction...
This paper proposes a failure-related definition of interdependencies. The concept of interdependencies has never been discussed with a level of formality that could support its systematic treatment. To be used in engineering settings, interdependencies cannot be just a generic term. No valid assessment of interdependencies can be made devoid of a clear constraint of the semantic value of the concept...
The assessment and the evaluation of the risk exposure to failures and cyber attacks, is nowadays - in times of pervasive ICT applications - a much required task. However, in some cases, and especially when evaluating an ICT infrastructure (which can be logically and geographically sparse and which can provide services to other systems), the evaluation of system risk is not sufficient. In fact in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.