The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The monitoring of modern large scale infrastructure systems often relies on complex event processing (CEP) rules to detect security and performance problems. For example, the continuous monitoring of compliance to regulatory requirements such as PCI-DSS and NERC CIP requires analyzing events to identify if specific conditions over the configurations of devices occur. In multi-organization systems,...
The vulnerabilities of a PCA-based face verification system against a hill-climbing attack using the uphill-simplex algorithm are studied. Experiments are carried out on the face subcorpus of the publicly available BioSecure DB, where the attack has shown a remarkable performance proving the lack of robustness of the tested system to this type of threat. Furthermore, the proposed attacking scheme...
This paper presents a concept, method, and implementation of utilizing phasor measurement unit (PMU) information to monitor the wide-area security of a power system. The close dependency of major transmission paths requires an approach that takes that interaction into account while establishing operational transfer capability, and evaluates grid reliability and security on a system-wide basis. Thus,...
The paper focuses on characterisation of information hiding possibilities in Cloud Computing. After general introduction to cloud computing and its security we move to brief description of steganography. In particular we introduce classification of steganographic communication scenarios in cloud computing which is based on location of the steganograms receiver. These scenarios as well as the threats...
With the continuously developing technology and growing complexity of software and systems, new demands and challenges appear for security, calling for new techniques and methods in addition to the already existing ones. The variety of initiatives and the variations in the characterizations makes it hard for users to select the most appropriate one for their needs. We propose a set of uniform characterizing...
AODV is the most common and the most important routing protocol. But AODV protocol has some severe security bugs, and routing table overflow is one of them. In this paper, RSAODV protocol model is first imported and introduced, and then it is applied to solve routing table overflow problem in AODV protocol. Finally, the validity of this solution is analyzed and proved from two aspects—routing found...
Nowadays the problem of controlling shareholders infringing minority shareholders' benefit has become the core to the company development. In order to prove the interest conflicts between the two and provide some helpful suggestions for minority shareholders protection, this paper has selected 82 listed family companies of China as the sample. And, by using the indirect method to establish a regression...
In Spain, Renewable Energy Sources (RES) have priority of dispatch in the process of scheduling the available power plants to satisfy system load requirements. Nevertheless, some non-RES units must be necessarily dispatched due to security or system constraints. Thus, at any given time, maximum RES production that can be fed into the system is limited. When RES available resource is higher than this...
The NFC Forum has released a first candidate for their Signature Record Type Definition. This specification adds digital signatures to the NFC Data Exchange Format (NDEF), which is a standardized format for storing formatted data on NFC (Near Field Communication) tags and for transporting data across a peer-to-peer links between NFC devices. With an increasing number of applications of the NFC and...
There is a need for an efficient design-for-testability to satisfy both testability and security of digital circuits. In our previous work, we reported a secure and testable scan design approach by using extended shift registers that are functionally equivalent but not structurally equivalent to shift registers, and showed a security level by clarifying the cardinality of those classes of shift register...
The Signature Record Type Definition was released by the Near Field Communication (NFC) Forum to provide integrity and authenticity to the NFC Data Exchange Format (NDEF). It achieves this goal by adding a digital signature and corresponding certificates to the NDEF message. Although the Signature Record Type Definition (Signature RTD) specifies the use of strong cryptographic algorithms like RSA,...
This paper proposes the application of moving window averaging technique for differential protection of transformer. The instantaneous currents of primary and secondary are transformed by using moving window averaging technique for the window width of one cycle. The steady state values of transformed currents are zero for a sinusoidal signal. However, the presence of harmonic and dc offset may deviate...
The electricity generation sector is currently under strong pressure to curb emissions of greenhouse gases. To achieve this, targets on the amount of energy that needs to come from “green” power sources are being imposed around the world. In response to these targets, large amounts of wind power generation are being integrated and are likely to represent soon a significant share of the overall generation...
Security is a very important requirement for any Web application. In order to avoid free-rider behaviors and reduce requesters' malicious accesses in Web services, a kind of trust management based on feedback and time decay in Web Services is presented in this paper. According to the service providers' feedback, honest accesses will be rewarded while dishonest ones will get punishment by such mechanism,...
Spinning reserve (SR) is one of the most important resources used by system operators to maintain system security, but excess amount of SR which goes against economy must be avoided. A new unit commitment model is proposed in the paper, which adds expected customer interruption cost (ECOST) into the objective function. Thus a pretty tradeoff between system security and economy can be achieved while...
The NFC Data Exchange Format (NDEF) is a standardized format for storing formatted data on NFC (Near Field Communication) tags and for transporting data across a peer-to-peer NFC link. Through NDEF and its various record types, events can be triggered on an NFC device by simply touching an NFC-enabled object. The number of use cases and real applications around NFC and NDEF technology increases continuously...
We reported a secure scan design approach using extended shift registers that are functionally equivalent but not structurally equivalent to shift registers. The security level of the secure scan architecture based on those shift register equivalents is determined by the probability that an attacker can identify the configuration of the shift register equivalent used in the circuit, and hence the...
GPRS offers the user can always on connection to Internet and Intranet. Some of the services may require high level of security. This can be financial transaction over the Internet, or exchange of confidential documents from a company's Intranet to an employee. It is important to have strong focus on the security, so companies and persons that demand high level of security can take advantage of the...
This paper proposes a stochastic activity network model for P2P file-sharing to evaluate the quality of service provided. Key characteristics taken into account include the number of peers, fraction of malicious peers, peer churn, endusers' behavior, and security evaluation scheme applied. The results show that security evaluation schemes influence the quality of service significantly, while the fraction...
The migration of processing of computational jobs from centralized systems to open distributed systems have resulted in many communication channels and transactions. These crucial and confidential jobs span a range of domains and organizations, not all of which can be trusted to the same extent. Inconsistencies in current trust relationships highlight the need for a flexible, general-purpose trust...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.