The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Trajectory privacy-preserving for Location-based Social Networks (LBSNs) has been received much attention to protect the sensitive location information of subscribers from leaking. Existing trajectory privacy-preserving schemes in literature are confronted with three problems: 1) it is limited for privacy-preserving by only considering the location anonymization in practical environment, and the sensitive...
This paper addresses the complex problem of recognising threat situations from videos streamed by surveillance cameras. A behaviour recognition approach is proposed, which is based on a semantic recognition of the event. Low-level tracking information is transformed into high-level semantic descriptions mainly by analysis of the tracked object speed and direction. Semantic terms combined with automatically...
In complex networks, filters may be applied at different nodes to control how packets flow. In this paper, we study how to locate filtering functionality within a network. We show how to enforce a set of security goals while allowing maximal service subject to the security constraints. To implement our results we present a tool that given a network specification and a set of control rules automatically...
The exposure of location information in location-based services (LBS) raises users' privacy concerns. Recent research reveals that in LBSs users concern more about the activities that they have performed than the places that they have visited. In this paper, we propose a new attack with which the adversary can accurately infer users' activities. Compared to existing attacks, our attack provides the...
We are interested in constructing monitors for the detection of confidential information flow in the context of partially observable discrete event systems. We focus on the case where the secret information is given as a regular language. We first characterize the set of observations allowing an attacker to infer the secret information. Further, based on the diagnosis of discrete event systems, we...
Modern system-level security threats have a strongly biological flavor. They are highly distributed and decentralized, continuously evolve around countermeasures, and develop emergent high-level effects out of proportion to the individual efforts of which they are composed. Measures to respond to such threats need to share these characteristics, suggesting techniques such as artificial immune systems,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.