The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Internet of Things (IoT) includes billions of things, i.e., connected objects and devices that are heterogeneous, distributed, and possibly intelligent and run applications and services from the Internet of Services (IoS). Things span, for instance, RFID tags, sensors, computers, plants, lamps, autonomous robots, and self-driving vehicles. Often, things are connected through heterogeneous platforms...
This paper investigates the use of deception in combating the deceiving attack in IEEE 802.22 cognitive radio networks. The deceiving attack is a coordinated combination of diverse jamming attacks sourced by the same malicious platform. In this paper, a deception-based defense scheme is proposed to counteract the deceiving attack. The non-existence of the pure strategy Nash equilibrium was proven...
Sequence alignment has been used to align DNA sequences to find matching segments of DNA from different specimens. Just as DNA sequences can be used to find similar patterns in DNA, this process can also be used on computer programs to identify when segments of code have been reused. Malware programs generally are made from other malware programs or malware templates. The byte information of these...
System-call analysis is recognized as one of the most promising approaches to malware detection due to its ability to facilitate detection of malware variants as well as zero-day malware. However, one of the key challenges of system-call based analysis - which prevents it from being used in real-time detection systems - is the excessive size/dimensionality of the system-call sequences that correspond...
In today's world of fast communication, to insure, the security and integrity of information is a big challenge. Data hiding also known as Steganography is one of the fields that deal in methods related information security and hide secret information and message other information. This paper elucidates the effect of data hiding in different number of least significant bits in the primary colors of...
Investigating insider threat cases is challenging because activities are conducted with legitimate access that makes distinguishing malicious activities from normal activities difficult. To assist with identifying non-normal activities, we propose using two types of pattern discovery to identify a person's behavioral patterns in network data. The behavioral patterns serve to deemphasize normal behavior...
The development of the Proximity based Mobile Social Networking (PMSN) has been growing exponentially with the adoption of smartphones and introduction of Wi-Fi hotspots in public and remote areas. Users present in the vicinity can interact with each other using the embedded technologies in their mobile devices such as GPS, Wi-Fi and Bluetooth. Due to its growing momentum, this new social networking...
Provides an abstract for each of the presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.
One of the most accurate biometric authentication methods is iris pattern. It has the advantages of being stable, contactless and no user's previous knowledge is required. This paper presents an iris recognition system for user authentication. To design the proposed iris authentication system we reviewed and evaluated four iris pattern recognition features including Histogram of Oriented Gradients...
Web services are the key technologies for the web applications developed using Service Oriented Architecture (SOA). There are many challenges involved in implementing web services. Some of them are web service selection and discovery which involves matchmaking and finding the most suitable web service from a large collection of functionally-equivalent web services. In this paper a fuzzy-based approach...
In the RFID (Radio Frequency Identification) system, a tag with a unique ID is attached to an object and a reader can recognize the object by identifying the attached tag. With this identified tag ID, the reader can then retrieve the related information of the object from the backend server database. Due to the nature of RF signals, the communication between the reader and tags is vulnerable to attacks,...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Rapid advances in wireless ad hoc networks lead to increase their applications in real life. Since wireless ad hoc networks have no centralized infrastructure and management, they are vulnerable to several security threats. Malicious packet dropping is a serious attack against these networks. In this attack, an adversary node tries to drop all or partial received packets instead of forwarding them...
Regular expression (RegEx) matching, the core operation of intrusion detection and prevention systems, remains a fundamentally challenging problem. A desired RegEx matching scheme should satisfy four requirements: DFA speed, NFA size, automated construction, and scalable construction. Despite lots of work on RegEx matching, no prior scheme satisfies all four of these requirements. In this paper, we...
The importance of IT security is out of doubt. Data, computer and network security are essential for any business or organization. Software security often remains out of focus, from an organization's, a developer's and from an end-user's point of view. We will consider security terminology, security bugs, security flaws, and mitigation issues.
Firewalls are widely adopted for protecting private networks by filtering out undesired network traffic in and out of secured networks. Therefore, they play an important role in the security of communication systems. The verification of firewalls is a great challenge because of the dynamic characteristics of their operation, their configuration is highly error prone, and finally, they are considered...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.