The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A System of Systems (SoS) is an arrangement of useful and independent sub-systems, which are integrated into a larger system. Examples are found in transport systems, nutritional systems, smart homes and smart cities. The composition of component sub-systems into an SoS enables support for complex functionalities that cannot be provided by individual sub-systems on their own. However, to realize the...
Computing systems produce large amounts of system log information at a scale wildly disproportionate to the growth of computing and bandwidth resources. This growth outpaces the ability of human auditors and administrators to digest such quantities of data via manual analysis. This situation is only expected to worsen over time as more and more data become available due to expanded technological reach...
The article presents the results of studies of the physical security system in the infrastructure facility of a region. The following results have been obtained: structural and functional decomposition of the physical security system for the regional infrastructure has been performed; engineering solutions for the implementation of the standard functions for the subsystems of the research object have...
The UHF Radiofrequency Identification technology offers nowadays a viable technological solution for the implementation of low-level environmental monitoring of connected critical infrastructures to be protected from both physical threats and cyber attacks. An RFID sensor network was developed within the H2020 SCISSOR project, by addressing the design of both hardware components, that is a new family...
As the Android app market keeps growing, there is a pressing need for automated tool supports to empower Android developers to produce quality apps with higher productivity. Yet existing tools for Android mostly aim at security and privacy protection, primarily targeting end users and security analysts. Towards filling this gap, we present DROIDFAX, a toolkit that targets the developers to help them...
Nowadays, providing a security system for houses has become a vital research in which the latest technologies are being adopted to serve this purpose. Wireless network is one of the technologies that have been used to provide remote monitor and control for the home appliances. This paper aims to propose a security door lock system based on Raspberry pi technology where cameras, keypad and pi-lids...
Increased interest in security has resulted in greater demand for automated test systems to comply with security standards. Automated test systems have traditionally been operated in isolated environments because of their unique characteristics. However, changes in United States defense acquisition regulations require that defense contractors bring these test systems into compliance with National...
In recent years, Internet of things has attracted attention worldwide due to the recent technological improvements. The main motive of Internet of things (IoT) is to make devices in the world to be connected through internet, so that they can share information automatically. However, many security problems have emerged. Therefore, a great deal of research work is to propose solutions to increase the...
In many security systems, it is sufficient to monitor a certain territory with the same type of devices in such a way that each point of the territory falls into the coverage area of at least one device while minimizing the energy consumption of the devices. However, in some security systems, it is necessary to observe objects from a certain side. For example, to identify a person you need to see...
Software-Defined Networks (SDN) is an emerging area that promises to change the way we design, build, and operate network architecture. It tends to shift from traditional network architecture of proprietary based to open and programmable network architecture. However, this new innovative and improved technology also brings another security burden into the network architecture, with existing and emerging...
The article describes the security systems at all stages of the construction of buildings and structures, the analysis at the sites during operation risk monitoring measures, taking into account possible emergencies.
The Wireless Sensor Networks (WSNs) are widely being used for monitoring different environments and are very effective for monitoring those areas where human presence can be critical. Meanwhile, Cloud Computing (CC) has emerged as a very large scale computational and storage service with pay-as-you-go usage model which has taken the WSN to entirely a new paradigm. This integration of WSN with CC provides...
Internet of Things (IoT) can be perceived as enabling user-specific interoperable communication services by integration of sensing and actuation technologies with other leading technologies, such as telecommunication, networking, security and cloud computing etc. Application of the ubiquitous IoT technologies to augment healthcare systems inadvertently exposes the latter to unpredictable, disruptive...
Software Defined Networking (SDN) is a new networking paradigm which provides better decoupling between control plane and data plane. The separation not only allows OpenFlow (OF) switches in the data plane simply to forward data, but also enables the centralized programmable controller to control the behavior of entire network. SDN makes it possible to manage the network more flexible and simple....
In order to effectively develop AAL solutions, it is crucial to analyse user requirements. The determination of actual user needs can make the difference between a nice to have and a real innovation. Integrating the target group successfully means being able to detect requirements and errors as well as needs, fears and barriers and utilize creative potential. The main advantage of such testing is...
Internet of Things (IoT) and its various application domains are radically changing the lives of people, providing smart services which will ultimately constitute integral components of the living environment. The services of IoT operate based on the data flows collected from the different sensors and actuators. In this respect, the correctness and security of the sensor data transported over the...
Nowadays, Internet of Things is one of the future developing directions. Some of the most important challenges it faces are related to security. Several massive distributed denial of service attacks have been deployed in the last months using “smart” devices, such as baby monitors or refrigerators. Connecting electronic devices without considering security can lead to severe problems. Using encryption...
Nowadays, security is a part that consent by many institution including academic for example in University campus, some of campus have been implement automatic system in campus area to control visitor to enter University also for the staffs and students, but the system is in standalone with introduce new gate pass. Most of University has been use Information Technology (IT) in application for academic...
Terrorists communicate and disseminate their activitiesusing social media, such as Twitter, where complex networksof user accounts are formed and need to be effectively analysedby Law Enforcement Agencies (LEAs). To this end, we proposea novel visualisation tool that assists intelligence analysts andinvestigators through the presentation of the network formation,components, key-players, key-communities...
There are over a billion devices running the Android operating system. It is being used globally in personal, public, private and government organizations. Device and application availability, often overlooked in research, is a huge component to globally maintaining healthy applications and personal communications. Published research into Android application availability threats and vulnerabilities...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.