The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Large Forest Fires are one of the most destructive and recurring natural disaster types around the world, and year after year they leave environmental, material and human irreparable losses in the social nuclei in which they occur. To face them, it is essential to have a Situation Awareness that allows decisions making according to reality, promoting the collaboration between the all involved and...
Software-defined networking (SDN) is a key emerging technology that enables networks to be programmed and dynamically reconfigured through software-based network applications. This programability also significantly increases the exposure of these networks to software application faults, which can compromise or crash the underlying SDN network. It is thus imperative to detect subtle faulty or malicious...
Fraud prevention in the banking sphere is a very important type of activity which can cover a whole range of fraud schemes — both from employees and customers. The article studies the existing technologies for realization of the system of security control over functioning of POS networks in real time and analyzes them in detail. Besides, the concept of the system of monitoring and analysis of threats...
SDN network’s policies are updated dynamically at a high pace. As a result, conflicts between policies are prone to occur. Due to the large number of switches and heterogeneous policies within a typical SDN network, detecting those conflicts is a laborious and challenging task. This paper presents two-fold contributions. First, we devise an offline method for detecting unmatched OpenFlow...
Automation of real time car parking system (RTCPS) using mobile cloud computing (MCC) and vehicular networking (VN) has given rise to a novel concept of integrated communication-computing platforms (ICCP). The aim of ICCP is to evolve an effective means of addressing challenges such as improper parking management scheme, traffic congestion in parking lots, insecurity of vehicles (safety applications),...
The aggregation of multiple carriers and even heterogeneous links is a well established method to boost data rates in wireless networks. At the same time, Network Coding has been proven as an efficient and robust mechanism to distribute content in mesh networks or cloud storages. In this paper, we introduce with ScalaNC a new method of heterogeneous link aggregation, which requires no changes in the...
The use of big data for cyber-physical systems (CPS) is gaining more importance due to the ever-increasing amount of collectable data. Due to the decreasing cost of sensors and the growth of embedded systems, which are increasingly used in the industries as well as in the private sectors, new methods are needed to evaluate and process the collected data. Therefore, in this paper we proposed a framework...
Virtualization technology is well established in the server and desktop spaces, and has been spreading across embedded system market. This technology allows for the coexistence and execution of multiples operating systems on top of the same hardware platform, with proven technological and economic benefits. Hardware extensions for easing virtualization have been added into several commercial off-the-shelf...
The mitigation of insider threats against databases is a challenging problem as insiders often have legitimate access privileges to sensitive data. Therefore, conventional security mechanisms, such as authentication and access control, may be insufficient for the protection of databases against insider threats and need to be complemented with techniques that support real-time detection of access anomalies...
Software Defined Networking (SDN) has proved to be a promising approach for creating next generation software based network ecosystems. It has provided us with a centralized network provision, a holistic management plane and a well-defined level of abstraction. But, at the same time brings forth new security and management challenges. Research in the field of SDN is primarily focused on reconfiguration,...
Cyber Physical System (CPS) communicates through communication networks which can be wired or wireless. These networks are prone to cyber-attacks. Thus security of such system is essential. In this paper a model for anomaly detection system has been proposed that enhances the security of the CPS. The system consists of a knowledge base, Kalman filter and a comparator model. The proposed security system...
As wireless and telecommunicaton infrastructure communications have been integrated into modern vehicle systems (i.e., infotainment systems and vehicle to vehicle systems), the security implications on the relatively unchanged underlying network protocols inside the vehicles are investigated by researchers and industrial experts in the corresponding domain. Some researchers have achieved the investigation...
This system is invented under the circumstance that security incidents frequently occurs when contemporary college students taking into outdoor activities. It is constructed based on the central idea of exploiting a safety management system on mobile terminal to further introduce the over all layout, different sorts of capacity and technology data base. The primary goal is to ensure the security of...
Social events like carnival parades are major activities for modern urban life. However, public authorities should tackle a series of challenges in order to successfully manage such spectacles that take place in specific time periods and urban areas inside a city. Such challenges mainly concern crowd management and resource planning operations. Local public authorities should be able to take fast...
In this paper, we predicted the changes of cyber-attacks techniques and patterns after the fourth industrial revolution with the epochal shift of information and communication technology and innovation of science and technology. Cyber space will be hyper-connection, cross-domain, and super intelligence space as connecting everything in the world due to a fusion of information and communication technologies...
This paper describes a distributed multi-user video analytics platform supporting multiple video providers and multiple analytics. Scalability, portability, adaptability and resiliency are the objectives of a well-integrated video analytics platform. Being an integrated system of systems comprised of various resource nodes, the challenges in building such an infrastructure ranges from efficient system...
Advanced Persistent Threat (APT) and traditional cyber attacks are different in kinds of aspects, which make the traditional defense is difficult to detect APT and protect the network. Therefore, an APT detection framework based on OpenIOC is established for the characteristics of APT system attack. Firstly, real-time attack data related to APT from massive fragmented threat data is output. Secondly,...
A Software-Defined Wireless Sensor Network (SD-WSN) is a recently developed model which is expected to play a large role not only in the development of the Internet of Things (IoT) paradigm but also as a platform for other applications such as smart water management. This model makes use of a Software-Defined Networking (SDN) approach to manage a Wireless Sensor Network (WSN) in order to solve most...
This manuscript intends to explore the application of a specific secure data environment within different prototypes of information sharing. It focuses on data management with confidence and agility for the exchange of information. Through discussion and examples, the paper explores the landscape surrounding sensitive data sets. In particular, the paper looks at the application of data sharing related...
In this paper, we propose and implement two electronic control unit (ECU) architectures for real-time automotive cyber-physical systems that incorporate security and dependability primitives with low resources and energy overhead. These ECUs architectures follow the multiprocessor system-on-chip (MPSoC) design paradigm wherein the ECUs have multiple heterogeneous processing engines with specific functionalities...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.