The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Lots of players, such as content holders, platform service providers, and application service providers are expected to continue to grow rapidly along with the utilization of electronic commerce. Moreover, increase in affiliate marketing might induces the appearance of many agents who manage billing areas in the near future. Because a large number of transactions are sent and received through the...
5G Networks are anticipated to provide a diverse set of services over Network Slices (NS) using Network Function Virtualization (NFV) technologies. We propose solutions to enable NS selection and routing of traffic routing through a NS. A framework for enabling negotiation, selection and assignment of NSs for requesting applications in 5G networks is presented. A definition for service description...
Satellite transmission based on IP may play important role for communication between event site and PPDR centers during large planned scenarios and disaster/unplanned ones. Geostationary SATCOM links that can be installed ad-hoc in any location present reliable and efficient way to transmit IP data even for voice communication based on VoIP. Using different mechanisms that handle multi connections...
In this paper, we proposed an IoT-based visitor detection system. It uses an IR sensor to detect human body and two ultrasonic sensors to locate visitor servo motor under the position. When a visitor is detected it drives camera module to locate the visitor. Recoded video and sensor data are stored in the Database. Saved data can see via the PC and Smart device. We developed the system using Raspberry...
Sequence alignment has been used to align DNA sequences to find matching segments of DNA from different specimens. Just as DNA sequences can be used to find similar patterns in DNA, this process can also be used on computer programs to identify when segments of code have been reused. Malware programs generally are made from other malware programs or malware templates. The byte information of these...
As the network size grows more and more, it becomes difficult to understand the entire network. Complex network theory is used to analyze the characteristics of the current network. Trust management schemes are suggested to understand the entire network security situation. The results of this paper reveal that in order to solve a security problem of a complex network reliably, a security policy needs...
With the new emerging technologies and fast development of modern world it becomes essential to keep data secure. It is impossible to manage large amount of data with traditional processing applications and such large amount of data is termed as big Data. Variety, volume, velocity, value and veracity are the features of large amount of data. Debates on the usage of cloud still exist even though development...
In modern years we see some growth in technology and for better traffic control on road with these some technologies the moving vehicle can do the better communication in Ad-hoc network which developed a new kind of technology like Vehicular Ad-hoc Network(VANET). VANET provides wireless communication with vehicle to road side unit. VANET can perform the communication between V2V, V2I, I2I. VANET...
We consider a communication scenario in which the channel undergoes two different classes of attacks at the same time: a passive eavesdropper and an active jammer. This scenario is modeled by the concept of arbitrarily varying wiretap channels (AVWCs), in which the channel varies from one channel use to the other in an unknown and arbitrary manner. It has been shown that uncorrelated codes fail to...
To date, the achievable ergodic secrecy sum rate has been studied for multiuser MIMO downlink systems with single-antenna receivers only. In this paper, we study multiuser MIMO downlink systems with multiple-antenna receivers and an external single-antenna eavesdropper to be kept ignorant of the transmitted messages. We adopt the block diagonalization technique at the transmitter to remove inter-user...
The centralized zone data service (CZDS) was initiated by the Internet Corporation for Assigned Names and Numbers (ICANN), a global Internet overseer, to facilitate sharing and access to zone data as hundreds of new generic Top-Level Domains (gTLDs) are added to the Internet. The goal of CZDS is to improve the security and transparency of the naming system. In this study, we explore CZDS's transparency...
Domain Name System (DNS) leakage occurs when queries for names within a private namespace are propagated in the public DNS infrastructure, which has various privacy implications. To reduce this leakage and improve Tor's privacy, Appelbaum and Muffet suggested in RFC 7686 the special-use of .onion domain name. They recommended how stub, recursive, and authority name servers should behave when encountering...
System-call analysis is recognized as one of the most promising approaches to malware detection due to its ability to facilitate detection of malware variants as well as zero-day malware. However, one of the key challenges of system-call based analysis - which prevents it from being used in real-time detection systems - is the excessive size/dimensionality of the system-call sequences that correspond...
The concept of pairing confidential-relevant variables (connected variables) using ridge regression and bootstrap sampling has recently been proposed for developing perturbation models to data privacy in cyber-physical systems. In this approach, a single set of perturbation parameters for all the pairs of connected variables has been used to achieve trade-off between data confidentiality and classification...
In this paper, for secure routing optimization we are introducing dynamic trust management protocol in information centric network and delay tolerant network (DTN) environments. In the existing system, dynamic trust management for DTN is used to deal with the detection of the selfish, malicious misbehaving nodes and genuine loss nodes. To disrupt DTN operations, malicious nodes performing trust-related...
This paper focuses on establishing a mechanism to perform capability rating to the software under test by exploiting the results from system testing. The rating is given based on the scores obtained from test strategies imposed to the software upon completion of system testing. Each test case is assigned with a fix score, in which the score is deducted accordingly when particular test case has defect...
In mixed-criticality systems, resource management services are required to recognize and fulfill system wide high-level constraints, e.g., end-to-end deadlines. This is not possible through individual resources in isolation. Instead, a system-wide view is necessary which requires system-wide decisions. In the European FP7 project DREAMS, services for system-wide adaptability of mixed-criticality applications...
We consider covert communication using a queuing timing channel in the presence of a warden. The covert message is encoded using the inter-arrival times of the packets, and the legitimate receiver and the warden observe the inter-departure times of the packets from their respective queues. The transmitter and the legitimate receiver also share a secret key to facilitate covert communication. We propose...
A two-dimensional linear time-invariant system is considered. The two dimensions of its states are observed by one sensor each. Every sensor quantizes its observations into a finite number of messages, using also the other sensor's past decisions. The combined sensor outputs should allow for a bounded estimation error (reliability). For a natural quantizer, we identify the cases where a price in the...
The discrete memoryless Z-Channel (DM-ZC) with a confidential cross-message is considered. Three messages are transmitted; encoder 1 transmits one message to be decoded by decoder 1. Encoder 2 transmits two messages, the first of them is to be decoded by decoder 2; the second message is to be decoded by decoder 1 and is required to be kept secret from decoder 2. The secrecy level is measured by the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.