The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor network will become isolated in various associated segments because of the disappointment of some of its hubs, which is known as a “cut”. In this paper, authors acknowledge the issue of distinguishing cuts by the remaining hubs of a wireless sensor network. System proposes an estimation which grants every hub to identify at the time of accessibility to an extremely assigned hub has...
A monitoring system plays an important role in the different open environments such as school, colleges, universities, offices, etc. An offline monitoring system continuously monitors the network and notify to the network administrator when any suspicious or abnormal activities happen within the network. The computer system has a standard processes along with some credentials which are predefined...
User profiles are important in many areas in which it is essential to obtain knowledge about users of software applications. Knowledge about a user includes his likes, dislikes, even his emotional state can be determined by user profiling. In this paper we examine what information constitutes a user profile; and how the profile information is used to get the emotional state of a user. We also study...
In human history, the dependency on secret phrases - passwords - known to only a selected few in a group has mostly ensured that only those are authorised to access certain resources or information. However, such passwords have also spelled disasters when compromised. Beyond passwords, multi-factor authentication requires the knowledge of or the possession of things other than a password to complete...
Every day we entrust our privacy, safety, and security to police officers sworn to protect and serve. While many critical infrastructure computer systems have been well studied, the computer infrastructure supporting these officers remains to be surveyed in public literature. We remedy this by characterizing a sample police department's systems through a security lens, discussing weak points and areas...
"Proxies" are Internet applications that enable Internet users to connect to (or tunnel through) remote resources using another machine for two distinct purposes. First, they allow users to access remotely all resources in a network (i.e. Virtual Private Network or VPN). Second, they bring some level of anonymity by bouncing traffic around proxies. The latter model may enable Internet users...
Cyber-Physical Systems are integration of computer-based equipment used in industrial automation, embedded systems, control systems and etc. Computer-based equipment needs to be protected against unauthorized access and control. The widely accepted approach to computer security is based on security in depth, meaning that the computer system is viewed as a layered structure and security is introduced...
Future avionics is no longer mere close electronic systems with the requirement changed, while it is pervasively controlled by dozens of frequent information exchange, open architecture and highly automatic systems. And this transformation has driven major advancements of security in avionics which contains computing security and communication security. Our team is focused on the security of next...
In asymmetric zero-sum games, one player has superior information about the game over the other. It is known that the informed players (maximizer) face the tradeoff of exploiting its superior information at the cost of revealing its superior information, but the basic point of the uninformed player (minimizer)'s decision making remains unknown. This paper studies the finite stage asymmetric repeated...
With deference to Butler Lampson, I present five hints specifically for building high-assurance cyber-physical systems: (1) use Turing-incomplete languages (2) simple interfaces are secure interfaces, (3) program the glue code and architecture, (4) system verification is a probabilistic game, and (5) high-assurance systems require a high-assurance culture.
Method for increasing protection level of desktop PC type computer software application and user data using smartphone is proposed and presented in this paper. Smartphones are widely used, almost every person has one and manufacturers of smartphones offer wide range of the devices. All desktop computer applications for some particular and special purposes have applied some kind of protection. This...
Mobile agents, which are used for building distributed systems effectively, are autonomous programs that can travel through a computer network to fulfill their tasks. For practical use of mobile agents, protecting agents and platforms is an extremely important matter. Nevertheless, few security techniques exist for the DASH agent framework, which supports agent mobility. Other agent frameworks such...
In Cloud Computing one of the most cogent issues is the storage of data because the entire data reside over a set of interconnected resource pool that enables the virtual machine to access those data. The data management and services may not be fully trustworthy because the resource pools are situated over various corners of the world. There are various issues that need to be addressed, but privacy...
In the preceding few years the security of databases is a challenging and multifarious issue for enterprises. As a matter of fact, databases are the premier targeted system in any corporation that holds confidential information, or its businesses' relies heavily on the data and its integrity and availability. Vulnerability in network and internet links to databases may trigger obscure things even...
Thailand is currently moving toward an ageing society. According to the current population structure, the number of elderly tends to be increasing while the number of working-age people is decreasing. Often the elderly require intensive healthcare, and due to the growing elderly population, the need for an adequate number of healthcare professionals to provide healthcare services becomes a big issue...
Since the first performance benchmarks proposed more than 25 years ago, the concept of comparing/ranking computer systems or components has proven to be a powerful instrument to promote the improvement of specific computer or software features. Following this path, many benchmarking studies have extended the benchmarking model initially proposed for performance to address the comparison of different...
Risk analysis of security threats in computer networks is one of the most challenging fields in network management. Security risk analysis is usually done by security experts. Although they utilize analysis tools such as scanners and analyzers, the need for expert is still inevitable. To reduce the need of security expertise for network administrator, yet performing security risk management, this...
In order to detect the malicious modify, so called hardware Trojan, a power consumption model was set up in this paper based on the side-channel analysis. Using the Euclidean and the Mahalanobis distance discriminaiton to achieve the detection and discrimination of hardware Trojan, compared the speed and accuracy of the two methods, then chose the better one to construct a classifier. Experimental...
Sequence alignment has been used to align DNA sequences to find matching segments of DNA from different specimens. Just as DNA sequences can be used to find similar patterns in DNA, this process can also be used on computer programs to identify when segments of code have been reused. Malware programs generally are made from other malware programs or malware templates. The byte information of these...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.