The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Future Vehicular Ad hoc Networks (VANETs) will be composed of smarter vehicles equipped with various capabilities such as sensing and computing abilities. Connected vehicles can be exploited for resources sharing commonly known as vehicular clouds. Regarding the large number of vehicles in VANET and the variety of resources in each one it seems that resources sharing and cloud computing over VANET...
Devices aimed for the Internet of Things (loT) market are required to be both low cost and highly secured, as they are expected to be integrated in ordinary "things" while storing and processing sensitive information. In this paper we examine the vulnerabilities of a commercial secured IoT memory chip to precise and localized back-side laser fault injection. We explain the different steps...
Emerging computing relies heavily on secure backend storage for the massive size of big data originating from the Internet of Things (IoT) smart devices to the Cloud-hosted web applications. Structured Query Language (SQL) Injection Attack (SQLIA) remains an intruder's exploit of choice to pilfer confidential data from the back-end database with damaging ramifications. The existing approaches were...
Usually, most of the data generated in real-world such as images, speech signals, or fMRI scans has a high dimensionality. Therefore, dimensionality reduction techniques can be used to reduce the number of variables in that data and then the system performance can be improved. Because the processing of the high dimensional data leads the increase of complexity both in execution time and memory usage...
In the last decades, the explosion of the volume of digital document images, and the development of consumer tools to modify these images, has lead to a huge increase on reported fraudulent document cases. This situation has promoted the development of automatic methods for both preventing forgeries in modified documents and detecting them. However, document forensics is a sensitive topic. Data is...
The available commercial and freeware mobile forensics tools heavily rely on a rooted mobile device for them to extract data. The potential effects of rooting the device before extraction could pose a threat to the forensic integrity rendering the acquisition process flawed. An endeavour was made in compiling of this paper investigating the impact of rooting android mobile devices on user data integrity...
Facial composite technologies are used to produce visual resemblances of an offender. However, resemblances may be poor, particularly when composites are constructed using traditional ‘feature’ composite systems deployed several days after the crime. In this case a witness may have forgotten important details about an offender's appearance. Engaging in early and repeated retrieval attempts could potentially...
The deployment of police super-recognisers (SRs) with exceptional face recognition ability, has transformed the manner in which some forces manage CCTV evidence. In London, SRs make high numbers of sometimes disguised suspect identifications from CCTV. In two experiments measuring immediate and one-week memory of unfamiliar faces in disguise, SRs were more accurate and confident than controls at correctly...
When Bitcoin was first introduced to the world in 2008 by an enigmatic programmer going by the pseudonym Satoshi Nakamoto, it was billed as the world's first decentralized virtual currency. Offering the first credible incarnation of a digital currency, Bitcoin was based on the principal of peer to peer transactions involving a complex public address and a private key that only the owner of the coin...
In the estimated $2.1 trillion enterprise of cyber-crime, 95% of threats are attributed to human errors. Most of these errors concern infected attachments or following URLs to infected websites. This paper provides a low-cost solution that uses semi-automated trusted software publisher whitelisting to make it theoretically impossible for current-day malware to execute directly on Windows 10 and Windows...
This paper is concerned with biometrie spoofing detection using the dynamics of natural facial movements as a feature. Facial muscle movement information can be extracted from video sequences and encoded using the Facial Action Coding System (FACS). The proposed feature constructs a Facial Action Units Histogram (FAUH) to encapsulate this information for the detection of biometric presentation attacks...
This paper introduces a novel algorithm that can achieve close-range landmine detection using Ground Penetrating Radar (GPR) data. The proposed GPR feature-based algorithm combines spectral and spatial edge features of the GPR signals to form a new oscillation feature, which can represent the reflection value change between the layers of a C-scan GPR image. The GPR feature-based algorithm detects...
Steganography is the science of hiding information to send secret messages using the carrier object known as stego object. Steganographic technology is based on three principles including security, robustness and capacity. In this paper, we present a digital image hidden by using the compressive sensing technology to increase security of stego image based on human visual system features. The results...
Accurate identification of criminal suspects by witnesses is vital for police investigations. Methods such as Cognitive Interviewing techniques have been employed for this reason to enhance witness recall. In the current project, we demonstrate the benefit of including a focused breathing exercise during face construction using the EvoFIT recognition-based facial composite system. Twenty participants,...
This study seeks to investigate how the development of e-government services impacts on cybersecurity. The study uses the methods of correlation and multiple regression to analyse two sets of global data, the e-government development index of the 2015 United Nations e-government survey and the 2015 International Telecommunication Union global cybersecurity development index (GCI 2015). After analysing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.