The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Internet of Things (IoT) has penetrated various domains, from smart grids to precision agriculture, facilitating remote sensing and control. However, IoT devices are target to a spectrum of reliability and security issues. Therefore, capturing the normal behavior of these devices and detecting abnormalities in program execution is key for reliable deployment. However, existing program anomaly...
Automatic detection of shout prosody in continuous speech signal involves examining changes in its production characteristics. Our recent study of electroglottograph signals highlighted that significant changes occur in the glottal excitation source characteristics during production of shouted speech, especially in the vowel contexts. But the differences between normal and shouted speech, in the production...
Attacks on critical infrastructures are beginning to increase in number and severity. They are often initiated by highly skilled attackers, who are capable of deploying advanced attacks to exfiltrate data or even to cause physical damage. In this paper, we re-visit the rationale for protecting against cyber attacks and propose a framework to monitor, detect and evaluate anomalous behaviour within...
Security watchstanders who monitor multiple videos over long periods of time can be susceptible to information overload and fatigue. To address this, we present a configurable perception pipeline architecture, called the Image Surveillance Assistant (ISA), for assisting watchstanders with video surveillance tasks. We also present ISA1, an initial implementation that can be configured with a set of...
Twitter is one of the most popular Online Social Networks (OSN). It is used by millions of users worldwide everyday. Due to the text limitation on Twitter (140 characters per tweet), URL (Uniform Resource Locator) shortening services are widely used, however they are not free from risks. Shortened URLs are completely different from the original URLs, and hence users have no idea where the short URLs...
Support Vector Machines (SVM) have been considered for real-life machine learning applications in various fields. Security concerns in modern industrial networks, also used in critical infrastructures, require novel monitoring techniques applicable for these constrained, real-time environments. Characteristics of these networks' traffic indicate that SVM can be a powerful tool for realizing a self-configuring...
This paper presents a text-mining based approach to detect cross-site scripting (XSS) vulnerable code files in the web applications. It uses a tailored tokenizing process to extract text-features from the source code of web applications. In this process, each code file is transformed into a set of unique text-features with their associated frequencies. These features are used to build vulnerability...
Recently, machine-learning based vulnerability prediction models are gaining popularity in web security space, as these models provide a simple and efficient way to handle web application security issues. Existing state-of-art Cross-Site Scripting (XSS) vulnerability prediction approaches do not consider the context of the user-input in output-statement, which is very important to identify context-sensitive...
Today video surveillance systems are widely used in public spaces, such as train stations or airports, to enhance security. In order to observe large and complex facilities a huge amount of cameras is required. These create a massive amount of data to be analyzed. It is therefore crucial to support human security staff with automatic surveillance applications, which will create an alert if security...
Current technologies for computer network and host defense do not provide suitable information to support strategic and tactical decision making processes. Although pattern-based malware detection is an active research area, the additional context of the type of malware can improve cyber situational awareness. This additional context is an indicator of threat capability thus allowing organizations...
RFID technology finds immense applicability in various domains utilizing identification as the base operation such as in access control, localization, and tracking etc. It may be designed to work satisfactorily for either singular or a limited range of applications. However, the strict-coupling between applications and RFID equipment must be relaxed to scale up their usability. In order to achieve...
We use information technology to accomplish a significant portion of our daily tasks. The way individuals choose to use technology varies as much as the outcomes of their usage. Appropriation the way that people choose or learn to use technology has been explored at a group level to explain group behaviors and performance. Although appropriation antecedents and outcomes have been investigated in many...
Attacks at the ??RFID layer??, where tags and readers interact, appear in the output data used by the ??strategic layer?? to monitor or authorize entities. Previous research has used contextual information from the ??real world layer?? or ??strategic layer?? for attack detection purposes; this means that detection methods need to be customized to the application environment. In contrast, we introduce...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.