Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
This paper considers asymptotic perfect secrecy and asymptotic perfect estimation in distributed estimation for large sensor networks under threat of an eavesdropper, which has access to all sensor outputs. To measure secrecy, we compare the estimation performance at the fusion center and at eavesdropper in terms of their respective Fisher Information. We analyze the Fisher Information ratio between...
In today's modern networks, routers rely on high-performance multi-core packet processing systems to implement a variety of applications and operations required to forward traffic. This leads to an increase in the complexity of such systems and hence the number of processing cores. Managing such processing cores and ensuring their correct operation become a difficult task. In this paper, we address...
Cognitive radio networks (CRNs) are vulnerable to various attacks. Primary user emulation attack (PUEA) is one kind of serious attacks. In order to combat PUEA, we propose an algorithm to detect PUEA in CRNs based on probability density function (PDF) assisted by belief propagation (BP), called PDF-BP. In the proposed algorithm, every secondary user (SU) calculates its belief value based on the PDF...
Biometrics are used for security purpose. It is used to recognize a person based on their unique characteristics. Among several biometrics, Fingerprint is the most widely used and acceptable biometrics. Biometric system has several advantages over traditional methods. But it can be affected by several attacks. The type 1 attack is performed at the sensor level. Differentiating a genuine biometric...
Additive Manufacturing (AM) uses Cyber-Physical Systems (CPS) (e.g., 3D Printers) that are vulnerable to kinetic cyber-attacks. Kinetic cyber-attacks cause physical damage to the system from the cyber domain. In AM, kinetic cyber-attacks are realized by introducing flaws in the design of the 3D objects. These flaws may eventually compromise the structural integrity of the printed objects. In CPS,...
Cooperative communication is one of the fundamental technologies for the future wireless networks including 5G to improve communication reliability and enhance spectrum efficiency. In this paper, we consider a buffer-aided relay that performs opportunistic selection of the legitimate users in presence of an eavesdropper under physical layer security constraints. The channel state information of users...
In recent years, the necessity to protect multimedia content from illegal copying has been made more critical by the advent of digital technology. Singular Value Decomposition (SVD) received much attention from the watermarking community due to its appealing properties, such as the invariance of singular values (SVs) to common image processing operations and geometric transforms, like rotation, translation...
We analyze the secrecy outage probability of selective relaying wiretap channels with K decode- and-forward (DF) relays and N collaborative eavesdroppers. In the main channel, we consider a two-hop relay network where the best relay is selected to transmit and the relay link is combined with the direct source-to-destination link at the destination. In the eavesdropper channel, we consider that the...
In this paper, we propose a method of fixed-length binary string extraction (denoted by LogGM_[)ROBA) from low-resolution palmprint image for developing palmprint template protection technology. In order to extract reliable (stable and discriminative) bits, multi-bit equal-probability-interval quantization and detection rate optimized bit allocation (DROBA) are operated on the real-valued features,...
The increasing frequency and total cost of security incidents require organizations to apply proper IS risk management in order to assess the economically reasonable usage of security measures. In this paper, we contribute a model that supports risk-related investment decisions in service-based information systems. The model supports decision makers in analyzing the cost-benefit trade off related...
A network has several attributes which play a role in determining the security of the network and its robustness to external threats. These attributes are related to security through a complex nonlinear function which is generally unknown to the network management personnel. Since the network security is an explicit function of these attributes, the managers do not realize when the value of a certain...
Many researchers have studied the multi-period shortfall-risk minimizing hedging problem under jump-diffusion settings, however, up to now, there has not been many literatures to directly present the analytic solution for such a hedging problem. In this paper, defining the terminal shortfall as hedging risk, we research the minimal shortfall-risk hedging problem of European option by means of MCMC...
This paper proposed a chaotic image scrambling scheme based on sorting transformation. The algorithm calculates the permuting address codes by sorting the chaotic sequence. Therefore, the scheme does not require knowing the probability density function of the chaotic orbits in advance, thus not only facilitating the choice of chaotic systems but also reducing the complexity of the scheme. The paper...
WPP(Wind Power Penetration) is an important indicator to ensure wind power system security. It is with great practical significance for knowing probability distribution of WPP. There were two types of method to calculate probability distribution of WPP in the past. One type of method which used statistic theory to calculate were fast but had to know simple function relationship between WPP and load...
SOA have been deployed as a mean to offer a better flexibility, to increase efficiency through reuse of services and also to improve interoperability by providing new opportunities to connect heterogeneous platforms. However, those benefits make security more difficult to control. Fortunately, new standards are proposed to treat this issue, but their current use makes the architecture much more complex...
This paper proposes an approach to locate the patched vulnerability by analyzing the differences between two versions of an executable file. The approach comprises two parts: finding the differences and auditing the differences. To find the differences, a heuristically method is presented to compute an isomorphism between two callgraphs, based on the definitions of similarity between functions, and...
Random key graphs form a class of random graphs naturally associated with the random key predistribution scheme of Eschenauer and Gligor. We compute the clustering coefficients of random key graphs, and then compare them with Erdos-Renyi graphs in the many node regime when the expected average degrees are asymptotically equivalent. On the parameter range of practical relevance in wireless sensor networks,...
In recent decade, DRM (digital rights management) has focused on security techniques for solving the issues as the malicious copy, free dissemination and unrestricted abuse of digital contents or assets. Whereas some increasingly enhanced security policies, which were implemented at contents provider-side or user-side, have not brought about optimal utilities for participants in the contents value...
Validating function pointers dynamically is very useful for intrusion detection since many runtime attacks exploit function pointer vulnerabilities. Most current solutions tackle this problem through checking whether function pointers target the addresses within the code segment or, more strictly, valid function entries. However, they cannot detect function entry attacks that manipulate function pointers...
It was pointed out that the simple authenticated key agreement (SAKA) protocol suffered three weaknesses. Several improved protocols, such as improved Lin protocol, E-SAKA protocol, then were proposed as claimed being free of these three weaknesses. After reviewing of these protocols, proofs are given that these protocols still suffer from the password guessing attack. Besides, the weakness that the...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.