Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Increased interest in security has resulted in greater demand for automated test systems to comply with security standards. Automated test systems have traditionally been operated in isolated environments because of their unique characteristics. However, changes in United States defense acquisition regulations require that defense contractors bring these test systems into compliance with National...
Internet of Things (IoT) connect different types of devices to control different things or simply read data from then, such as room temperature, location, pressure and others, in a variety of application domains using the World Wide Web. This is a challenge for technology and Information Security (IS). Therefore, this paper surveys advances in IoT-based with an eye towards security, where discusses...
A monitoring system plays an important role in the different open environments such as school, colleges, universities, offices, etc. An offline monitoring system continuously monitors the network and notify to the network administrator when any suspicious or abnormal activities happen within the network. The computer system has a standard processes along with some credentials which are predefined...
Future avionics is no longer mere close electronic systems with the requirement changed, while it is pervasively controlled by dozens of frequent information exchange, open architecture and highly automatic systems. And this transformation has driven major advancements of security in avionics which contains computing security and communication security. Our team is focused on the security of next...
The access to information globally and by a significant percentage of the world population is an indispensable part of our daily routine. With this global network access comes the increased possibility of malicious attacks and unauthorized access to identity, information, and other resources. In order to curb the latest threats resulted from the internet revolution in the past few years many quick...
Personal health record (PHR) is considered a crucial part in improving patient outcomes. However the adoption rate by the general public in the US still remains low. To find out the barriers in adopting PHR, we have surveyed articles related to personal health record system (PHRS) from 2008 to 2016 and categorized them into 6 different categories such as motivation, barriers, ownerships, interoperability,...
Interconnected vehicles are a growing commodity providing remote access to onboard systems for monitoring and controlling the state of the vehicle. Such features are built to facilitate and strengthen the owner's knowledge about its car but at the same time they impact its safety and security. Vehicles are not ready to be fully connected as various attacks are currently possible against their control...
This security system provides a cost-efficient alternative solution to intelligent security systems by using a standard webcam, personal computer, and a PIC microcontroller. This system uses a program developed in NI-LabVIEW which uses image processing. The said program only records the camera input once motion is detected, which reduces the duration of the video footage, disk space needed, as well...
In response to recent cyberattacks, mathematicians, cryptographers, and security experts have advocated developing alternative approaches for building "high-assurance" cryptographic software. There's evidence that computer tools that deliver high-assurance cryptographic software are within our reach.
Today incident detection mechanisms, that define CERT / CSIRT effectiveness, based mostly on two principles — signature and heuristic. Their disadvantage is that they are focused on mathematical models, which require a lot of time to prepare statistics and so it decreases CERT/CSIRT efficiency. In this work, we have proposed approaches to ensure CERT / CSIRT high efficiency and its evaluation. To...
The network traffic classification is one of the most fundamental work in the network measurement and management, and this problem is more and more impact as the network scale grows. Many methods are proposed by researchers, but methods based on flow statistics seem more popular than the others. In this paper, we proposed a novel method based on refined flow statistical features. The new statistics,...
Information technology (IT) plays a vital role in healthcare administration and management. IT facilitates doctors, nurses or physicians to improve the speed and performance of the medical system as a whole. This results in accumulation of healthcare data since various types of software which generate their own data types have been widely used. Since different software were used in different medical...
At CTU FTS we are currently developing BioTest, an authentication system for testing students using state-of-the-art information technology and unambiguous Biometric authentication for each user. We use this system for identification during exams and testing. The BioTest software operates on the basis of a student's face recognition comparing the pattern with data on the student's ID card, while informing...
As billions of devices connect to the Internet, a new Web of Things is emerging, with virtual representations of physical or abstract realities increasingly accessible via Web technologies. Achieving a new phase of exponential growth, comparable to the earliest days of the Web, will require open markets, open standards, and the vision to imagine the potential for this expanding WoT.
Increasing demand on data center and computer labs in Indonesia affected by the increasing number of users who use the computer for business or education. One of the main requirements that can not be separated from the use of a computer is a storage area in the form of a USB Flash Disk, External HD, HD to Internal HD for the need for a large-scale computer servers located in the data center, laboratory...
Outsourcing the processing of sensitive data is problematic and leads the implementation of procedures and specific authorizations. In this paper we examine the implementation of the decentralization of data in the case of bank data printing and review proposed safeguards to ensure the availability, integrity and confidentiality.
In a recent research study concerning current and future (state-of-the-art) cloud security issues, we recognised a substantive number of security loopholes in information technology systems and devised relevant solutions for such problems. As an outcome, exchanging the main point that contains all the information originating from heterogeneous sources that oversee the physiological methodologies of...
Innovative approaches for securing the computing systems have intense inference for our understanding of technological, societal, economical, and political phenomena in making guiding principles, policies, rules and security implementations. The model presented here is based on cooperative and collaborative multilateral relationship among the shared business community partners. The sole responsibility...
Computer and network systems are consistently exposed to security threats, making their management even more complex. The management of known vulnerabilities plays a crucial role for ensuring their safe configurations and preventing security attacks. However, this activity should not generate new vulnerable states. In this paper we present a novel approach for autonomously assessing and remediating...
OpenSSL's recently disclosed Heartbleed vulnerability underscores the need for concrete methods to counter such vulnerabilities in future software development.
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.