The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Having an effective security level for Embedded System (ES), helps a reliable and stable operation of this system. In order to identify, if the current security level for a given ES is effective or not, we need a proactive evaluation for this security level. The evaluation of the security level for ESs is not straightforward process, things like the heterogeneity among the components of ES complicate...
Network efficiency and proper utilization of its resources are essential requirements to operate wireless networks in an optimal fashion. Cognitive radio aims to fulfill these requirements by exploiting artificial intelligence techniques to create an entity called cognitive engine. Cognitive engine exploits awareness about the surrounding radio environment to optimize the use of radio resources and...
Code smells represent well known symptoms of problems at code level, and architectural smells can be seen as their counterpart at architecture level. If identified in a system, they are usually considered more critical than code smells, for their effect on maintainability issues. In this paper, we introduce a tool for the detection of architectural smells that could have an impact on the stability...
In this paper we propose a new adaptive learning framework that classifies learner's based on individual preferences in terms of understanding and processing information. This framework generates learner's learning style based on Felder Silverman learning style model and suggest learning content based on learning style. The paper outlines how the system allows instructors to monitor learner's learning...
Vulnerability scanners are deployed in computer networks and software to timely identify security flaws and misconfigurations. However, cloud computing has introduced new attack vectors that requires commensurate change of vulnerability assessment strategies. To investigate the effectiveness of these scanners in cloud environments, we first conduct a quantitative security assessment of OpenStack's...
In the present days of rapid adoption of cloud services and varying cost models it is imperative to have a system which converts the cloud resource usage data into a measurable and payable cost. The system should be able to collect the cloud resource usage data, process it against a dynamically determined rate to get a charge for which the customer could be billed upon. These operations need to be...
The Fish4Knowledge (F4K) project involves analysing video generated from multiple camera feeds to support environmental and ecological assessment. A workflow engine is utilised in the project which deals with on-demand user queries and batch queries, selection of a suitable computing platform on which to enact the workflow along with a selection of suitable software modules to use to support analysis...
By now, the Web has matured into a full-scale application platform and its popularity is constantly rising. However, popularity comes at a cost: theWeb is becoming more and more of a target for attackers. In this paper, we argue that the security analysis of web browsers deserves attention and the data on their security evolution is of high value. We examine the security evolution of the widely used...
This paper discusses a new paradigm of network service and in-network resource control: relational metric based control. The relational metrics indicate the closeness relationship between objects in the real world, and these objects could be people, locations, things, and content. Closeness is measured by using a fusion of online and physical sensing. We will describe the system model and discuss...
Insider Threat has become one of the most important types of attacks to identify and combat for both government and commercial organizations in recent years. The irreversible financial and security damages that can result from this type of threat have placed Insider Threat among the most important problems in cybersecurity [1]. The complexity of the problem is mainly due to the fact that the attacker...
It can be essential in the new-generation content services to predict the potential demands of people, which they themselves have not recognized or cannot express precisely. Social graphs representing the relationships between people are used for predicting demand in current Internet-based services. However, these graphs cannot represent the relationships of two users residing in common communities...
Business metrics play a critical role in determining the best system-level configuration to achieve an organizational business-level goal. We present a framework for reasoning about business-level implications of malicious attacks affecting information technology (IT) systems that underlie various business processes. Through an exemplar web-based retail company scenario, we demonstrate how to quantify...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.