Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Together with the popularity of graph structure in real world data, graph analysis has become an attractive research topic. Triangle counting is one of typical graph mining tasks and plays a significant role in complex network analysis, with a wide range of applications in social network analysis, spam detection, and computer-aided design applications. Given the sensitive nature of graph data, the...
Industrial espionage through complex cyber attacks such as Advanced Persistent Threats (APT) is an increasing risk in any business segment. Combining any available attack vector professional attackers infiltrate their targets progressively, e.g. through combining social engineering with technical hacking. The most relevant targets of APT are internal enterprise and production networks providing access...
Recently, Slideshow presentations such as research talking, demonstrations and lectures are performed heavily. On the other hand, handwriting ones are rarely performed. However, handwriting still have advantages and slideshow also have limitations. In this paper, we investigated merits and demerits of slideshow and handwriting lectures and proposed new oral presentation method that has both merits...
The most important purpose of intrusion detection system is to identify attacks against information systems. It is a security method attempting to identify various attacks. In this paper, we reviewed snort as misuse based intrusion detection system as well as ALAD, PHAD, LERAD, NETAD as anomaly based statistical algorithms.
Connection setup in software-defined networks (SDN) requires considerable amounts of processing, communication, and memory resources. Attackers can target SDN controllers with simple attacks to cause denial of service. We proposed a defense mechanism based on a proof-of-work protocol. The key characteristics of this protocol, namely its one-way operation, its requirement for freshness in proofs of...
Strict Priority Queuing (SPQ) is a widely used queuing method for applying preferential service on edge networks. SPQ, in presence of persistent high priority traffic, is known to behave in a very hostile manner toward low priority flows, causing them to experience poor TCP performance. This often leads to substantial packet losses, which consequently results in aggressive reduction in the congestion...
In this paper, multi-node hybrid Cooperative cellular communication is considered with Amplify and Forward (AF) and Decode and Forward (DF) replaying protocols. Most of researchers have evaluated the performance of cooperative communication either with DF or AF relaying protocols. Considering single DF relay at midway between Source and Destination, for fixed target error probability we have evaluated...
In this paper, we apply the k-core decompostion to analyse the Autonomous System (AS) level Internet connectivity graph from January 2006 to October 2013 and finally obtain 94 Internet Nuclei for each month. Then, we empirically study the evolution and characteristics of the Internet Nucleus and find that the size of the Internet Nucleus grows in a linear form, which is different from the exponential...
In order to make it easier to evaluate network systems whose protocols are beyond current simulators' competence scope, a new network simulation platform is designed and implemented. We propose a new network simulator for Wireless Access in Vehicular Environments (WAVE) protocols. It is totally implemented using C++ programming languages. The core simulating operation flow of proposed simulator is...
The security of industrial control systems has been a big topic by the Stuxnet case in 2010. As a solution which can solve these requirements, data diode has emerged. A data diode is a computer security device that restricts the communication along a network connection between two computers so that data can only be transmitted in one direction. This enables a more sensitive or highly classified computer...
Radio Frequency Identification (RFID) is considered to be an authentication technology of great potential. Due to the bright future of low-cost RFID tags in practical situations, the authentication towards multiple tags and tag groups has become the research hotspot. However, there are many concerns about the security risks and privacy issues in lightweight RFID authentication scenarios. Many researches...
This paper considers two dimensional valence-arousal model. Pictorial stimuli of International Affective Picture Systems were chosen for emotion elicitation. Physiological signals like, Galvanic Skin Response, Heart Rate, Respiration Rate and Skin Temperature were measured for accessing emotional responses. The experimental procedure uses non-invasive sensors for signal collection. A group of healthy...
IoT clusters arise from natural human societal clusters such as a house, an airport, and a highway. IoT clusters are heterogeneous with a need for device to device as well as device to user trust. The IoT devices are likely to be thin computing clients. Due to low cost, an individual IoT device is not built to be fault tolerant through redundancy. Hence the trust protocols cannot take the liveness...
The reported project aims to confirm whether a tactile glove fingertips' stimulator is effective for a brain-computer interface (BCI) paradigm using somatosensory event potential (SEP) responses with possible attentional modulation. The proposed simplified stimulator device is presented in detail together with psychophysical and EEG BCI experiment protocols. Results supporting the proposed simple...
We are discussing a framework for formally modeling and analyzing the security of trusted boot processes. The presented framework is based on actor networks. It considers essential cyber-physical features of the system and how to check the authenticity of the software it is running.
Increased dependency of the human society on the Electrical Energy, demands extra provision for sophisticated monitoring and control. The Monitoring of the Electrical System involves observing whether all the electrical parameters like voltage, power, current are within the scheduled limits or not and the Controlling of the Electrical System involves the necessary actions that are to be taken if the...
Cryptography and Encryption methods are means to ensure confidentiality of data transferred from one computer to another. While design of appropriate security protocols is vital for information security, making sure that they are implemented accurately and effectively is even more important. Effective implementation of encryption algorithms and security protocols involves implementing big number arithmetic...
The number of network systems and network applications is rapidly increasing with the wide deployment of broadband network access. Network protocols and algorithms, as key components of network systems, are usually developed and evaluated in a simulated network, an emulated network and/or a real network. In this paper, we propose evalBox, a cross-platform evaluation framework that provides support...
This paper presents a high level system architecture of the work done by Team NEDO-JSK for DRC (DARPA Robotics Challenge), which was held on 5th–6th, June, 2015, California, USA. DRC was a competition which included driving vehicle, manipulating objects and locomotion over rough terrain. Communication between robot and operators were limited in a similar way to teleoperating situation. The system...
The traditional PXI instrument generally has fixed function and its firmware is difficult to upgrade. To overcome this problem, the reconfigurable PXI instrument is proposed to meet different requirements. The design is implemented by using Field Programmable Gate Arrays (FPGAs) with reconfigurable function. In this paper, in order to satisfy the different vehicle bus test requirements, a reconfigurable...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.