The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ubiquitous learning environments have an increasing trend considering the huge number of connected smart devices dedicated to educational services. Ubiquitous learning (U-learning) provides to students the possibility to learn at anyplace and anytime within the collaborative environment using interactive multimedia system that enables effective communication among teacher and learners. The architecture...
Emerging software defined networking (SDN) paradigm provides flexibility in controlling, managing, and dynamically reconfiguring smart grid networks. It can be seen in the literature that considerably less attention has been given to provide security in SDN-enabled smart grid networks. Most of the efforts focus on protecting smart grid networks against various forms of outsider attacks only by providing...
In this paper we propose to consider a study aimed at improving the Honeypot system performance. There is observed architecture of the designed service of collecting and updating common database of exploits, which is necessary for this study, necessary for building and further Honeypot system maintenance. The data obtained using this service are analyzed in order to determine the free server software...
In Wyner wiretap II model of communication, Alice and Bob are connected by a channel that can be eavesdropped by an adversary with unlimited computation who can select a fraction of communication to view, and the goal is to provide perfect information theoretic security. Information theoretic security is increasingly important because of the threat of quantum computers that can effectively break algorithms...
The Smart Grid (SG) initiative introduces a two-way communication between utility companies and the consumers thanks to Advanced Metering Infrastructure (AMI) networks. One of the most crucial components that constitute an AMI network is smart meters (SMs). SMs execute some programs called firmware to rule the hardware. The firmware occasionally needs to be updated to fix bugs and improve the services...
The wide-spreading mobile malware has become a dreadful issue in the increasingly popular mobile networks. Most of the mobile malware relies on network interface to coordinate operations, steal users' private information, and launch attack activities. In this paper, we propose TextDroid, an effective and automated malware detection method combining natural language processing and machine learning...
Web applications commonly provide a high attack surface. In today's world of high impact attacks, protecting them against both known and unknown attacks becomes more important than ever. We present an approach of machine learning based anomaly detection to flexibly detect anomalous requests. Our approach leverages long short-term memory (LSTM) neural networks to learn a detailed model of normal requests...
Increasingly, trust has played a crucial role in the security of an IoT system from its inception to the end of its lifecycle. A device has to earn some level of trust even before it is authenticated for admission to the system. Furthermore, once the device is admitted to the system, it may behave maliciously over time; hence its behavior must be evaluated constantly in the form of trust to ensure...
Tor hidden services make it possible to hide Internet services' location. Via so-called rendezvous circuits, Tor users can communicate with hidden services without learning each other's location. In this paper, we propose a performance-enhanced rendezvous circuit, which consists of five instead of six relays. We show that omitting the client's middle relay in a rendezvous circuit brings significant...
Trajectory privacy-preserving for Location-based Social Networks (LBSNs) has been received much attention to protect the sensitive location information of subscribers from leaking. Existing trajectory privacy-preserving schemes in literature are confronted with three problems: 1) it is limited for privacy-preserving by only considering the location anonymization in practical environment, and the sensitive...
To realize the vision of Internet-of-Things (IoT), numerous IoT devices have been developed for improving daily lives, in which smart home devices are among the most popular ones. Smart locks rely on smartphones to ease the burden of physical key management and keep tracking the door opening/close status, the security of which have aroused great interests from the security community. As security is...
In a complicated cloud storage environment in which users upload a large number of files everyday, in order to better solve the challenge of inefficient malicious detection and weak adaptability of multi-platform detection in the traditional way, we propose a malicious file detection method which is based on image texture analysis and BP neural network algorithm. By combining the technology of image...
Middleboxes present new requirements that need to be integrated with traffic engineering applications that are already complex and consider myriad factors (e.g., routing, QoS, load-balancing). While it is possible to revisit traffic engineering algorithms to explicitly integrate middleboxes, such an approach is not compositional. Existing efforts at compositional SDN application development do not...
Wireless sensor networks are responsible for sensing, gathering and processing the information of the objects in the network coverage area. Basic data fusion technology generally does not provide data privacy protection mechanism, and the privacy protection mechanism in health care, military reconnaissance, smart home and other areas of the application is usually indispensable. In this paper, we consider...
In every existed technical tool and specific-purpose application, security must be in watch all the time. Each of these has its security implications that need to be considered specifically in order to protect all users' data and information and prevent putting them at risk. Moreover, the rapid development and spread of many technologies such as mobile networks and smart phones, IoT, smart cities,...
The app repackaging has became one of the most serious problems on Android platform nowadays. In the past, most of studies focus on the code detection, which deals with the billion opcodes, thus time consumption is expensive. Besides, it lacks the resistance to code obfuscation and hardening technology thus accuracy will easily be affected. Recently, UI-based detection was proposed. Some dynamic UI-based...
Hidden behind domain names, there are lucrative (and ingenious) business models that misuse/abuse the DNS namespace and employ a diversified form of monetization. To curb some of those abuses, many research works have been proposed. However, while having a clear contribution and advancing the state-of-the-art, these works are constrained by their limited datasets and none of them present a survey...
Smart mobile terminal are an essential device in our life today. The user usually enters in the related words or draws a simple graphic on the touch screen as passwords for unlocking the screensaver. Although this way can provide users with simple and convenient security mechanism, the process would increase the risk of words or graphic information leakage under the strict security consideration....
Wireless mesh networks begin to be used as an infrastructure of cyber-physical systems. A critical issue in developing wireless cyber physical systems (WCPSs) is the limited amount of energy available in the nodes. Energy consumption analysis can help designer to conduct a power-aware design process. In this paper, we propose a model based energy consumption analysis framework at architecture level...
Representational state transfer (REST), which is a style of software architecture with simplicity and flexity, has been widely adopted in web services. To solve challenges like multidemensional API validation requirements, call sequencing and organization of test cases, data dependency between test cases, this thesis proposes a REST API testing model with an expressive description language based on...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.