The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Communication systems in today's world are no longer traditional in nature. Platforms required for Industry 4.0 that fall under Control and Monitoring systems, are datagathering units which gather data from remote devices and monitor them. Such platforms have various components which communicate with each other for data handling and monitoring. In the traditional peer-to-peer model, every module communicates...
Computer networks today typically do not provide any mechanisms to the users to learn, in a reliable manner, which paths have (and have not!) been taken by their packets. Rather, it seems inevitable that as soon as a packet leaves the network card, the user is forced to trust the network provider to forward the packets as expected or agreed upon. This can be undesirable, especially in the light of...
One of the most important aspects of a wireless health monitoring system is the security of data. In this paper, security attacks against the complete transmission chain of a medical health monitoring system are enumerated and classified based on their threat to three security principles: confidentiality, integrity and availability. The communication chain is divided in a standard way into three tiers...
This paper presents an approach to handle compromised components in an Infrastructure-as-a-Service Cloud Computing platform. Our experiments show that traditional incident handling procedures are applicable for cloud computing, but need some modification to function optimally.
IP prefix hijacking is a well-known security threat that corrupts Internet routing tables and has some common characteristics such as MOAS conflicts and invalid routes in BGP messages. We propose a simple but effective IP prefix hijacking detection method which is based on reachability monitoring. Network reachability means a characteristic that a packet must reach the destination network although...
In this article we present a mechanism of protection and reconfiguration of a critical infrastructure. In order to react in real time to various threats and challenges occuring, this mechanism is distributed and fully automated, no human intervention is required. This mechanism can then be seen as the immune system of the critical infrastructure on which it is deployed.The immune system has agents...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.