Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Recent advances in interference exploitation showed that exploiting knowledge of interference constructively can improve the receive signal-to-interference and noise ratio (SINR) at the destination. This paper exploits this concept to design artificial noise (AN) beamformers constructive to the intended receiver (IR) yet keeping AN disruptive to possible eavesdroppers (Eves). A multiple-input single-output...
In this paper, we extend the use of the Discrete Orthogonal Stockwell Transform (DOST) by introducing a blind reversible and fragile medical image watermarking (MIW) method for image integrity checking. 2D DOST is first applied to the host image, the watermark is inserted in the high frequency coefficients based on the Difference Expansion (DE) technique. The extraction process provides host image...
In our previous work, we have applied ordinary linear regression equation to network anomaly detection. However, the performance of ordinary linear regression equation is susceptible to outliers. Unfortunately, it is almost impossible to obtain a “clean” traffic data set for ordinary regression model due to the burstiness of network traffic and the pervasive network attacks. In this paper, we make...
Advertisements in mobile applications have been shown to be a true danger to the users' privacy and security. Unfortunately, all existing solutions for protecting users from this threat are not simultaneously satisfying in terms of effectiveness or deployability. Leveraging recent advances in app virtualization on Android, we present in this paper a solution for in-app ad-blocking that provides a...
This paper proposes an adaptive audio steganog-raphy scheme based on wavelet packet energy which canbe used to hide secret messages in digital audio. The majorcontribution of the proposed scheme is that the wavelet packetsub-bands of the host audio can be selected adaptively to embedthe secret messages according to the masking effect of humanauditory system (HAS) and weighted energy concentration...
Physically Unclonable Functions (PUFs) are a promising security technique which utilize the random process variation in silicon fabrication in order to create unique identifiers and other security features that are impossible to recreate exactly. This paper builds upon and evaluates a weak PUF which employs dynamic latched comparators and their random input offset voltages to create a chip-specific...
Neural networks provide state-of-the-art results for most machine learning tasks. Unfortunately, neural networks are vulnerable to adversarial examples: given an input x and any target classification t, it is possible to find a new input x' that is similar to x but classified as t. This makes it difficult to apply neural networks in security-critical areas. Defensive distillation is a recently proposed...
Network connectivity is a primary attribute and a characteristic phenomenon of any networked system. A high connectivity is often desired within networks; for instance to increase robustness to failures, and resilience against attacks. A typical approach to increasing network connectivity is to strategically add links; however adding links is not always the most suitable option. In this paper, we...
Hardware based hash functions might provide a low cost and low power alternative to the classic solutions, which are based on implementations of mathematical cryptographic algorithms. In this paper, we propose MemHash, a hardware secure hash function built using memristive technology that exploits the unique properties of memristors. The MemHash operation is based on intrinsic device characteristics...
Radio Frequency Identification (RFID) devices are widely used in many domains such as tracking, marking and management of goods, smart houses (IoT), supply chains, etc. However, there is a big number of challenges which must still be overcome to ensure RFID security and privacy. In addition, due to the low cost and low consumption power of UHF RFID tags, communications between tags and readers are...
CAPTCHAs are applied on websites to differentiate between human users and automated programs, which indulge in spamming and other fraudulent activities. Since there are many websites that provide services in Arabic language, Arabic CAPTCHAs have been proposed by a number of studies. These CAPTCHAs rely on the distortion of text images rendering them unrecognizable to essentially pattern recognition...
Biometric features are widely used in real time applications for unique human identification. Iris is one of the physiological biometric features which are regarded as highly reliable in biometric identification systems. Often iris is combined with other biometric features for robust biometric systems. It is also observed that biometrics is combined with cryptography for stronger security mechanisms...
DroidMate is a fully automated GUI execution generator for Android apps. DroidMate explores an app, i.e. (a) repeatedly reads at runtime the device GUI and monitored calls to Android APIs methods and (b) makes a decision what next GUI action (click, long-click, text entry, etc.) to execute, based on that data and provided exploration strategy. The process continues until some termination criterion...
A modern automotive design contains over a hundred microprocessors, several cyber-physical modules, connectivity to a variety of networks, and several hundred megabytes of software. The future is anticipated to see an even sharper rise in complexity of this electronics, with the imminence of driverless vehicles, the potential of connected automobiles within a few years, and work towards seamless integration...
Cloud computing is gaining significant attention, however, security is the biggest hurdle in its wide acceptance. Users of cloud services are under constant fear of data loss, security threats and availability issues. Recently, learning-based methods for security applications are gaining popularity in the literature with the advents in machine learning techniques. However, the major challenge in these...
We investigate in this paper the achievable secrecy rate of the multiple-input single-output (MISO) visible light communication (VLC) Gaussian wiretap channel with single user and single eavesdropper. We consider the cases when the location of eavesdropper is known or unknown to the transmitter. In the former case, we derive the optimal beamforming in closed form, subject to constrained inputs. In...
In security sensitive applications, there is a crafty adversary component which intends to mislead the detection system. The presence of an adversary component conflicts with the stationary data assumption that is a common assumption in most machine learning methods. Since machine learning methods are not inherently adversary-aware, it necessitates to investigate security evaluation of machine learning...
The challenging traits of 5G networks to support novel and diverse business requirements of vertical sectors have rendered current network security approaches impotent. To address various security requirements of 5G networks and services, a holistic and robust security architecture mindful of 5G technical and business features becomes vital. This paper describes a holistic security architecture for...
Although correct error handling is crucial to software robustness and security, developers often inadvertently introduce bugs in error handling code. Moreover, such bugs are hard to detect using existing bug-finding tools without correct error specifications. Creating error specifications manually is tedious and error-prone. In this paper, we present a new technique that automatically infers error...
Lots of players, such as content holders, platform service providers, and application service providers are expected to continue to grow rapidly along with the utilization of electronic commerce. Moreover, increase in affiliate marketing might induces the appearance of many agents who manage billing areas in the near future. Because a large number of transactions are sent and received through the...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.