The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Malware analysis technology is important for Android security. However, existing Android malware analysis approaches, both static approaches and dynamic approaches, have their own advantages and drawbacks. In this paper, by combining static and dynamic approaches, we propose the forced execution technique for Android apps to automatically extract their hidden information such as encoded URLs, promoting...
This article deals with the issue of automated determination of product sales price in the on-line environment. It also describes the method of calculation and the importance of global market position based on the prices and services offered. The article describes the sources where you can obtain information on the prices and marketability of the products. It describes the procedure to find the relevant...
In recent years a number of organizations have experimented control systems for monitoring the environmental parameters of complex buildings, with the goal of improving well-being, optimizing management costs. These solutions are often characterized by sophisticated, costly technologies that allow to monitor the situation even from remote desks, take proper actions whenever any parameter fails to...
Due to the lack of a centralized management, mobile ad hoc networks (MANETs) are prone to various types of attacks. Trust management systems has been proposed to allow such networks to identify misbehaving nodes, enforce their collaboration in network functions. However, the trust management can be challenged by unique characteristics of MANETs in terms of absence of centralized management, severe...
It is possible to streamline corporate Environment, Health, and Safety (EH&S) duties through the use of workflow management technology. This approach requires a specification of workflow models that among others are composed of activities. A domain-specific workflow meta data model is proposed. The model consists of modelling concepts for the detection of failures of EH&S activities that already...
Despite the rapid pace of gadgets released on the market, research in the area of usable interfaces for wearables is lagging behind. Smartglasses are new wearables that embed diverse sensors but also have small displays, and this makes it hard for the wearer to visualize real-time data. To bridge this gap, the contribution of this paper is threefold. First, we propose a data representation model to...
Intelligent service provisioning for smart ageing requires not only the current status of smart objects, but also the knowledge of the service and its surrounding environment. Hence, context information is detected by processing the stream of data and the situation is recognized by reasoning them to project the prediction of the service environment as well as to update the knowledge. Knowledge based...
The extensive use of cloud services by both individual users and organizations induces several security risks. The risk perception is higher when Cloud Service Providers (CSPs) do not clearly state their security policies and/or when such policies do not directly match user-defined requirements. Security-oriented Service Level Agreements (Security SLAs) represent a fundamental means to encourage the...
Computer networks today typically do not provide any mechanisms to the users to learn, in a reliable manner, which paths have (and have not!) been taken by their packets. Rather, it seems inevitable that as soon as a packet leaves the network card, the user is forced to trust the network provider to forward the packets as expected or agreed upon. This can be undesirable, especially in the light of...
Memory error exploits rank among the most serious security threats. Of the plethora of memory error containment solutions proposed over the years, most have proven to be too weak in practice. Multi-Variant eXecution (MVX) solutions can potentially detect arbitrary memory error exploits via divergent behavior observed in diversified program variants running in parallel. However, none have found practical...
We study statistical issues related to the use of words in messages on SNs, as related to specific potentially catastrophic events, such as fires and earthquakes. The analysis investigates the frequency of the words in the messages of interest, moreover their temporal correlation, and aims to determine a reasonable number of keywords for the searches of the events, especially in relation with analytics...
The aim of this paper is to propose a complementary Health Management module to monitor the GPS accuracy for autonomous vehicles. Based on sensor information, the error causes of GPS can be observed in some specific contexts (urban, climate…). The proposed module relies on a Bayesian Network model that allows to reinforce the belief of GPS failure based on evidence. A hardware/software implementation...
Recently, the automatic highlighting of anomalous changes in a sequence of social graph snapshots is receiving growing interest due to its numerous applications. For instance, it may be helpful for the identification of attackers or risky users in Online Social Networks (OSNs). Indeed, dynamically monitoring and learning the friendship patterns of users in a large social graph over time for any anomalous...
This paper proposes a methodology for run-time safety management in Smart Work Environments (SWE), based on a semantic assessment of the risks, based on defined indicators. To assess SWE safety, we define a novel ontological model for representing its characteristics and introduce a metric for run-time evaluation of the SWE safety level. A description logic reasoner is used to automatically check...
This report provides an introduction to the papers accepted for the VSC track at IEEE WETICE 2016, held in Paris (France), from June 13th to 15th, 2016.
In recent years there has been a great deal of academic and practitioner interest in the role of ‘benefits realisation management’ [BRM] approaches, as a means of proactively leveraging value from IT investments. However, as automated technologies are increasingly being introduced on the basis that they deliver more cost-efficient solutions than their human counterparts, important questions needs...
Continuous assessment of the quality of health-related life (HRQoL) of patients is an important aspect of health and gives rise to several readings. On one hand, the enormous amount of information that is generated allows the extraction of knowledge with great accuracy concerning the disease, the treatments and the impact it has on society, on the other hand, this continuous monitoring allows effective...
The growing amount of information produced by automatic systems is often associated with the paradigm of Big Data. Next to this approach it remains the interest in integrating information of different origin within a shared framework, conceptually able to be formalized by an ontology. The IEC Common Information Model (CIM) is a natural candidate to take on the role of reference ontology in the electrical...
This paper proposes an architecture for managing and distributing context information from an AAL (Ambient Assisted Living) environment to the cloud. The architecture, with semantic features, includes the processing of the sensed data using QoC (Quality of Context) parameters and data transport using SDN (Software-defined Networking). The experiments showed that the semantic context processing allows...
Birmingham City University (BCU) is in the 7th year of a 9 year new multi-campus development building scheme worth £250m. This paper discusses how technology-systems within the new campus buildings are being used to gather information on patterns of usage and in-turn shape services and target resources. Such systems include access-control, building management and power management systems, wireless-services...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.