The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The interplay between an intrusion detection mechanism and a false data injection mechanism is investigated in this work in the context of an infinite horizon Linear Quadratic Gaussian Control System (LQG). A game theoretic framework is proposed between the attacker, who wishes to impair the operation of the control system while remaining stealthy, and the detector, who wishes to detect the presence...
Automatic Generation Control (AGC) is a key control system in the power grid. It is used to calculate the Area Control Error (ACE) based on frequency and tie-line power flow between balancing areas, and then adjust power generation to maintain the power system frequency in an acceptable range. However, attackers might inject malicious frequency or tie-line power flow measurements to mislead AGC to...
Multi-tenancy in cloud-based applications helps cloud providers improve their Quality of Service (QoS) and reduce service customization and maintenance time. This result is achieved by sharing resources among many tenants, which can be in the form of applications composed of multiple web services. However, distinct tenants may impose different security requirements on their perspective of the application...
Security threats should be identified in the early phases of a project so that design solutions can be explored and mitigating requirements specified. In this paper, we present a crowd-sourcing approach for creating Personae non Gratae (PnGs), which model attack goals and techniques of unwanted, potentially malicious users. We present a proof of concept study that takes a diverse collection of potentially...
Federation is generally used to denote collaboration between IT systems in different administrative domains to achieve common goals. Different administrative domains are typically distinct and loosely coupled by definition. While domains may have some degree of self-awareness, their awareness of other domains may be weak or non-existent. Hence, there is a fundamental challenge concerning how to build...
Applications in computer network security, social media analysis, and other areas rely on analyzing a changing environment. The data is rich in relationships and lends itself to graph analysis. Traditional static graph analysis cannot keep pace with network security applications analyzing nearly one million events per second and social networks like Facebook collecting 500 thousand comments per second...
Software developers need to address security risks and elicit security requirements in the early stages of the Software Development Life Cycle. It is important to investigate how novices can incorporate security in the early stages of the SDLC.
With recent advances and demands for data storage, new architectures for data controller chips are picking pace. Accordingly, the test methodologies for such chips are also becoming crucial since the large shipping volumes of those chips demand very few field returns. Along with the advances there is a need for a robust test strategy with some novel techniques which can be enabled to test the SOC...
As the system is deployed in the dynamic environments, the need of self-adaptive system is increasing. In addition, by advancing the network technology, self-adaptive system interacts with other systems to achieve the complex goals, which are difficult to be achieved by single self-adaptive system. During the interaction, they may share security-critical information. As a result, security becomes...
Physical layer security in slow fading wiretap channels is often guaranteed by constraining the secrecy outage probability (SOP) below a maximum tolerable value. In this paper, we propose a new nonadaptive (NADP) transmission scheme for maximizing the secrecy throughput by using adjustable transmit power based on the instantaneous channel state information (CSI) of the main channel under an SOP constraint...
In cloud storage, the data owner and data users can easily perform cooperative work on shared data. In this paper, we focus on operation behavior auditing in shared cloud storage, which is significant for the avoidance of potential crimes in the cloud and equitable accountability determination for the forensic investigation in shared cloud. We first introduce a novel secure public auditing model for...
Nowadays, web service selection has become a very challenging issue. As the number of web services is increasing drastically, different QoS parameters are added in their description in addition to their functional parameters (Inputs and outputs) to distinguish them and ease their selection. Hence, web service selection consists to find out among services having the same functionalities the optimal...
Analyses of the interactions among quality requirements (QRs) have often found that optimizing on one QR will cause serious problems with other QRs. As just one relevant example, one large project had an Integrated Product Team optimize the system for Security. In doing so, it reduced its vulnerability profile by having a single-agent key distribution system and a single copy of the data base – only...
In cloud storage, auditing for operation behavior logs (OBLs) plays an increasingly important role in the field of cloud auditing. In this paper, we first introduce our third party auditing model for user's operation behavior. Further, a novel secure logging approach is proposed to ensure the OBLs security in cloud. Then, we present a secure public auditing scheme for OBLs. Specifically, BLS signature...
Trust is one of the major factors that a system needs to achieve the secure interaction. Trust can represent the social and reliability perspective of the security. This characteristic makes trust the soft security factor. There are some attempts to evaluate trust, however, they do not consider the characteristics of self-adaptive systems such as self-* properties, openness, and uncertainty. In this...
In this paper, a novel steganography algorithm based on an improved "Matrix Pattern" (MP) method is presented. In this process, firstly, an RGB image is divided into the non-overlapping square-sized blocks. Next, 95 dynamicsized unique matrix patterns are automatically generated using the 4th and 5th bit layers of the green layer of each block, which are assigned to 95 English keyboard characters...
Compared with other areas, knowledge management in education area has been lack of attention for a long time. This paper did a survey on undergraduate in a Chinese research university. By designing the questionnaire, implementing the survey website by programming, we got 515 original data from art students and science students. Then we analyzed the data by several data-mining algorithms, e.g. the...
Physical layer security has become popular in recent years. In satellite communication systems, wire-tap users are easy to obtain information from satellite side for the range of the beam is broad. In this work, we consider the multi user scenario, by adopting the dynamic beam forming in satellite networks, the beam could be restricted into the small range, where wire-tap users could not obtain information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.