The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many of the industries such as manufacturing, F&B, transportation have recently shown a growing interest in Industry Internet of things (IIoT) to gain competitive advantage. The IIoT is technology stack of combining internet of things, machines, computers and people enabling intelligent business transformational through advanced big data analytics. With the growing complexity of IIoT in a large-scale...
The integration of Internet-of-Thing (IoT) devices to smart buildings raises the risk of vulnerabilities in building operation. This paper presents the software development work for the secure deployment of IoT devices in commercial buildings. Security threats with their countermeasures are analyzed in the context of a specific Building Automation System (BAS) implementation called Building Energy...
P2P networks constitute the foundation for many scalable and fault-tolerant applications. These networks may consist of millions of peers due to their decentralized design. While each peer advertises the same service interface, the actual data provided by common large-scale P2P applications often yields an imbalance, i.e., particular peer subsets are more frequently contacted than the rest of the...
Assessing E-commerce web sites quality is essential not only to have recommendations for improvement but also to make comparisons with competitors. In this paper, the aim is to know the best criteria for the evaluation and obtain a weight for them using fuzzy Analytic Network Process (fuzzy ANP). The subjective judgments of the decision maker are expressed by fuzzy numbers. The decision making problem...
In today's world of fast communication, to insure, the security and integrity of information is a big challenge. Data hiding also known as Steganography is one of the fields that deal in methods related information security and hide secret information and message other information. This paper elucidates the effect of data hiding in different number of least significant bits in the primary colors of...
Traffic flowing through a software defined network is vulnerable to disruptions caused by malicious switches. The malicious behaviors are diverse such as dropping traffic, adding traffic or modifying it. A switch could be malicious or otherwise dysfunctional or misconfigured. A lot of work in SDN has addressed the problem by securing the control plane and having it validate network wide properties...
The intention of an Android application, determined by the source code analysis is used to identify potential maliciousness in that application (app). Similarly, it is possible to analyze the unintentional behaviors of an app to identify and reduce the window of vulnerabilities. Unintentional behaviors of an app can be any developmental loopholes such as software bugs overlooked by a developer or...
The focus of present research paper is to manage data integrity and trustworthiness of issues involved in software testing phase of software development life cycle. Many times, it seems that, data integration left behind the software testing phase and it is directly focused at software deployment or delivery time. To avoid issues due to lack of data integration, we developed algorithm which can track...
This paper presents exact solution methods for analyzing vulnerability of electric power networks to a certain kind of undetectable attacks known as false data injection attacks. We show that the problems of finding the minimum number of measurement points to be attacked undetectably reduce to minimum cut problems on hypergraphs, which admit efficient combinatorial algorithms. Experimental results...
Shellcodes are widely used to exploit applications. Shellcodes can breach security and privacy to an unimaginable extent. Poor Programming results in various bugs that give attacker a chance to exploit an application. Exploiting an application allows attacker to inject a malicious code and transfer control of program to the injected code. The malicious code injected during exploitation is usually...
Building contractors have many risks to face. we took the multi-level comprehensive evaluating method of gray relational analysis and effectively resolved the problem of index weight in system, the comprehensive relational degree from this study gave a basis to evaluate building contractors' risks scientifically.
In cloud data center, shared storage with good management is a main structure used for the storage of virtual machines (VM). In this paper, we proposed Hybrid VM storage (HVSTO), a privacy preserving shared storage system designed for the virtual machine storage in large-scale cloud data center. Unlike traditional shared storage, HVSTO adopts a distributed structure to preserve privacy of virtual...
Nowadays the amount of data is being produced exponentially with the rapid development of electronic technology and communication, which makes it hard to cost-effectively store and manage these big data. Cloud computing, a new business model, is considered as one of most attractive solutions for big data, and provides the advantage of reduced cost through sharing of computing and storage resources...
We investigate the strength of patterns as secret signatures in Android's pattern based authentication mechanism. Parallelism of GPU is exploited to exhaustively search for the secret pattern. Typically, searching for a pattern, composed of a number of nodes and edges, requires an exhaustive search for the pattern. In this work, we show that the use of GPU can speed up the graph search, hence the...
Location and time are two critical aspects of most security-related events, and thus, spatiotemporal data analysis plays a central role in many security-related applications. The human brain has great capabilities of developing invariant representations of objects by taking advantage of both spatial similarity of features of objects/events and their relative timings (temporal information). Trace learning...
Randomly selecting 8 × 8 host blocks in big-blocks for data embedding, YASS, a recently developed advanced stegano-graphic scheme makes these blocks not coincident with the 8×8 grids used in JPEG compression. As a result, it effectively invalidates the self-calibration technique used in modern steganaly-sis. However, the randomization is not sufficient enough, i.e., some positions in an image are...
This paper presents an information system security evaluation model referring to Common criteria (CC). Analytic Hierarchy Process (AHP) and Grey Relational Analytic Process (GRAP) are applied to this model which combines the qualitative evaluation with the quantitative decision. AHP is used to obtain the indices' weights with respect to the final goal of the security evaluation. GRAP is adapted to...
Network threat assessment is an important branch of information security assessment. Its research involves data fusion and data mining. This paper provided an overview of related research efforts in the area of network threat assessment. It presented a network threat assessment framework, and demonstrated a computational approach based on attribute recognition theory. In the computational example,...
With the wide deployment of P2P networks, the attacks against them have been attracting more and more attention. However, studies on security problems in P2P network mainly focus on individual attack. We still lack systemic analysis of attacks in P2P network. Understanding the taxonomy and the relationships between attacks will help to build the security mechanism and effectively organize the defense...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.