The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Medical Cyber Physical Systems (MCPS) are lifecritical networked systems of medical devices. These systems are increasingly used in hospitals to provide high-quality healthcare for patients. However, MCPS also bring concerns about security and safety and new challenges to protect patients from acts of theft or malice. In this paper, we focus our investigation on a thorough understanding of threat...
Security cases—which document the rationale for believing that a system is adequately secure—have not been sufficiently used for a lack of practical construction method. This paper presents a hierarchical software security case development method to address this issue. We present a security concept relationship model first, then come up with a hierarchical asset-threat-control measure argument strategy,...
In this presentation, I describe how the SEI’s Security Engineering Risk Analysis (SERA) method provides a structure that connects desired system functionality with the underlying software to evaluate the sufficiency of requirements for software security and the potential operational security risks based on mission impact.
As modern unmanned aerial systems (UAS) continue to expand the frontiers of automation, new challenges to security and thus its safety are emerging. It is now difficult to completely secure modern UAS platforms due to their openness and increasing complexity. We present the VirtualDrone Framework, a software architecture that enables an attack-resilient control of modern UAS. It allows the system...
Selecting, developing and deploying a document management system for engineering use involves the ability to follow an engineering revision process, integrate easily with engineering and corporate applications (custom or Commercial Off the Shelf (COTS)), uniting disparate on-premise and cloud systems, and integrating existing and evolved business processes and applications.
The advancement in Autonomous Vehicles (AVs) has created an enormous market for the development of self-driving functionalities, raising the question of how it will transform the traditional vehicle development process. One adventurous proposal is to open the AV platform to third-party developers, so that AV functionalities can be developed in a crowd-sourcing way, which could provide tangible benefits...
This paper presents the development of wide area protection (WAP). The studied case focuses on Vientiane Capital area, Lao PDR. It consists seven substations which are connected the loop network in 22 kV distribution system. The protection system based a characteristic are setting on substation each. The fault area in circuit mainly was affecting the operation of protection, when has occurred a fault...
At present, internet and social networks are most used by teenagers. New on-line conduct and preferences have been generated by positive and negative content and easily accessed in the web without any parenting control. The purpose of this paper is to recall most common risks for teenagers like inappropriate content, pornography, websites with malicious software, contact avoidance with unknown people...
Security is a real concern for the society and it is not different for software. Vulnerable applications can expose the users to multiple risks. Software disassembling is an interesting approach to discover vulnerabilities. Unmounting an application into Assembly code can reveal multiple characteristics from the software. During the disassembling, technical features can be revealed that enable the...
The information system audit developed in a data center it was based on the study of the domains of COBIT; for this reason the survey for each component it was developed with the goal of obtain the necessary information for audit. The analysis of this information, permited to establish the degree of compliance with international standards, and determine the maturity, risk levels of each of the components...
In this paper we propose to consider a study aimed at improving the Honeypot system performance. There is observed architecture of the designed service of collecting and updating common database of exploits, which is necessary for this study, necessary for building and further Honeypot system maintenance. The data obtained using this service are analyzed in order to determine the free server software...
This paper contains a description of programs currently available for detecting physiological changes in the human reaction to a stressful situation. For each program described what is being evaluated, what we get like output of the program, advantages, disadvantages and potential contribution to commercial security. As alternative solutions are included training programs to help security personnel...
Software Defined Network (SDN) is an advanced approach to designing dynamic, manageable, cost-effective, and adaptable network architectures. SDN will play a key role as an enabler for 5G and future networks. Transferring network monitoring functions to a software entity working in conjunction with configurable hardware accelerators through a scheme called Software Defined Monitoring (SDM) is one...
This study evaluated the effectiveness of thumbnails generated using open source image saliency software for representing digitized archival documents. Salient thumbnails were evaluated against a baseline (full images scaled down) in a lab study that assessed the thumbnails' usefulness during finding and re-finding tasks. Results found no significant differences in time or user preference. However,...
The importance to protect from non-authorized access of audio information transmission in multimedia systems is very high. [1] There are a lot of methods and algorithms suitable for the general case to secure transmission of all kind of data, including video and audio as a part of the multimedia information [2] In this article is proposed a special methodological approach to design and implementation...
Today's Internet technology is not free from problems. Unfortunately, it is used by people who have no right to steal important data. The National ICT Training and Research Center (PUSTIKNAS) Ministry of Communication and Information Technology the Republic of Indonesia is one of the government agencies that often suffer experimental intrusion by outsiders. One solution is to implement a honeypot...
Despite being known since a long time, memory violations are still a very important cause of security problems in low-level programming languages containing data parsers. We address this problem by proposing a pragmatic solution to fix not only bugs, but classes of bugs. First, using a fast and safe language such as Rust, and then using a parser combinator. We discuss the advantages and difficulties...
Scanning attack threatens the security of network communication severely. Traditional network communication usually uses static IP address configuration, which provides convenience to scanning attackers. In this paper, an IP Hopping (IPH) communication scheme is proposed based on software-defined network to solve this problem, in which IP addresses can be assigned to the hosts in the network dynamically...
A significant milestone is reached when the field of software vulnerability research matures to a point warranting related security patterns represented by intelligent data. A substantial research material of empirical findings, distinctive taxonomy, theoretical models, and a set of novel or adapted detection methods justify a unifying research map. The growth interest in software vulnerability is...
The Internet can be considered as the most important infrastructure for modern society and businesses. A loss of Internet connectivity has strong negative financial impacts for businesses and economies. Therefore, assessing Internet connectivity, in particular beyond their own premises and area of direct control, is of growing importance in the face of potential failures, accidents, and malicious...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.