The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With deference to Butler Lampson, I present five hints specifically for building high-assurance cyber-physical systems: (1) use Turing-incomplete languages (2) simple interfaces are secure interfaces, (3) program the glue code and architecture, (4) system verification is a probabilistic game, and (5) high-assurance systems require a high-assurance culture.
Method for increasing protection level of desktop PC type computer software application and user data using smartphone is proposed and presented in this paper. Smartphones are widely used, almost every person has one and manufacturers of smartphones offer wide range of the devices. All desktop computer applications for some particular and special purposes have applied some kind of protection. This...
Mobile agents, which are used for building distributed systems effectively, are autonomous programs that can travel through a computer network to fulfill their tasks. For practical use of mobile agents, protecting agents and platforms is an extremely important matter. Nevertheless, few security techniques exist for the DASH agent framework, which supports agent mobility. Other agent frameworks such...
In Cloud Computing one of the most cogent issues is the storage of data because the entire data reside over a set of interconnected resource pool that enables the virtual machine to access those data. The data management and services may not be fully trustworthy because the resource pools are situated over various corners of the world. There are various issues that need to be addressed, but privacy...
In the preceding few years the security of databases is a challenging and multifarious issue for enterprises. As a matter of fact, databases are the premier targeted system in any corporation that holds confidential information, or its businesses' relies heavily on the data and its integrity and availability. Vulnerability in network and internet links to databases may trigger obscure things even...
Thailand is currently moving toward an ageing society. According to the current population structure, the number of elderly tends to be increasing while the number of working-age people is decreasing. Often the elderly require intensive healthcare, and due to the growing elderly population, the need for an adequate number of healthcare professionals to provide healthcare services becomes a big issue...
Since the first performance benchmarks proposed more than 25 years ago, the concept of comparing/ranking computer systems or components has proven to be a powerful instrument to promote the improvement of specific computer or software features. Following this path, many benchmarking studies have extended the benchmarking model initially proposed for performance to address the comparison of different...
Risk analysis of security threats in computer networks is one of the most challenging fields in network management. Security risk analysis is usually done by security experts. Although they utilize analysis tools such as scanners and analyzers, the need for expert is still inevitable. To reduce the need of security expertise for network administrator, yet performing security risk management, this...
In order to detect the malicious modify, so called hardware Trojan, a power consumption model was set up in this paper based on the side-channel analysis. Using the Euclidean and the Mahalanobis distance discriminaiton to achieve the detection and discrimination of hardware Trojan, compared the speed and accuracy of the two methods, then chose the better one to construct a classifier. Experimental...
Sequence alignment has been used to align DNA sequences to find matching segments of DNA from different specimens. Just as DNA sequences can be used to find similar patterns in DNA, this process can also be used on computer programs to identify when segments of code have been reused. Malware programs generally are made from other malware programs or malware templates. The byte information of these...
Educational Universities are gradually enhancing the traditional delivery mode towards blended learning, virtual classrooms and distance learning with the help of technology to reach the various demands of programs needed by people around the world. Learners are looking for specific programs of their interest, regardless of the location. Modern learning trends depend more on the technology and electronic...
Steganography is a method of hiding a secret message within an ordinary message, where as the goal of cryptography is to make data unreadable by an unauthorized persons. Video steganography is expansion of image steganography where video files can simply viewed in a sequence of images. There are many difference between video and image steganography. As the video content is very dynamic and have less...
Phylogeny model inference plays an important role in malware forensics. It aims at revealing the evolutionary relationship among malware instances. It is expected to be helpful for uncovering the trends of malware evolution and establishing a principled naming scheme. Although tree-based models are the mainstream direction, they are not suited to represent the reticulation events which are occasionally...
System-call analysis is recognized as one of the most promising approaches to malware detection due to its ability to facilitate detection of malware variants as well as zero-day malware. However, one of the key challenges of system-call based analysis - which prevents it from being used in real-time detection systems - is the excessive size/dimensionality of the system-call sequences that correspond...
A significant number of Moroccans use cybercafes on a regular basis for work and leisure. Unfortunately, if these cybercafe machines are infected with malware, such malware can steal users' passwords and other sensitive information. Assessing cybercafe security in Morocco can help assess the risk that users encounter when using cybercafes. However, to the best of our knowledge, there is no academic...
Dropbox, Google Drive, OneDrive, Box etc are popular File Storage providers for the Cloud. Recently reported vulnerability like Heartbleed for servers using OpenSSL has created panic among Cloud users. Hence, it is essential to encrypt the files by the users before uploading them to the cloud. Many File encrypting tools like Veracrypt, AxCrypt, Boxcrypt, are in place to encrypt files. But they have...
Typing CAPTCHA is usually troublesome and is unpleasant for the users. But the security of some of the websites depends on it and causes that human being is distinguished from robots facing with different websites. Filling CAPTCHA by humans can be used effectively like electronization of books and different texts. In this article it has been attempted to examine using image processing for converting...
Mission critical embedded systems should be capable of performing intended functions with resiliency against cyberattacks. The methodology of design-for-cybersecurity is now widely recognized, in which the effects of cybersecurity, or lack thereof, on system objectives must be determined. However, developers are often challenged by the difficulty of analyzing a system-under-design without complete...
Being DNS an essential service for Internet reliability, it is an attractive target for malicious users. The constantly increasing Internet traffic rate challenges DNS services and their attack detection methods to handle actual queries while being flooded by tens of millions of malicious requests per second. Moreover, state of the art on hostile actions evolve fast. DNS administrators continuously...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.