The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we introduce a defensive cybersecurity framework called Cybergrenade automating various penetration testing tools to sequentially exploit machines connected to a single local network, all underneath a single application running on a Single-Board Computer (SBC). This takes advantage of the SBC's unique capabilities in a way that manual exploitation simply cannot match. Currently, while...
This paper reviews digital forensic phases and problems in evidence analysis phase and smart methods in this area. Among these phases, studies on the evidence analysis phase are examined. In the analysis of electronic evidences, use of smart methods and their development will contribute to information technology law and improvement of digital forensic devices. Effective evidence analysis both provides...
For a long time, the sensitivity and criticality of data storage, processing, and transmission have hindered the wide utilization of IT and networks in the health care systems. Recently, the high availability, reachability, reliability, efficiency, usability and automation provided by the different cloud computing models paved the way to integrate the e-health systems with these cloud services to...
Some companies are willing to execute their business processes (BP) in the cloud for enjoying its benefits. However, they are also reluctant because of the new security risks that using cloud resources introduces. Security risk includes many dimensions, but this work focus on preserving the privacy of the logic of a BP deployed in a multi-cloud context by preventing a coalition of malicious clouds...
The increasing occurrence of large scale disasters calls out for a collaborative approach to crisis management, where multiple and heterogeneous organizations of first responders are deployed within the damaged area and must interact with each others in order to cooperate in the damage assessment and recovery actions. Such an approach requires a suitable communication platform to allow these organizations...
Stackelberg security games are represented by a Stackelberg model for multiple defenders and attackers. The dynamics of the game involves defenders trying to allocate their limited resources to defend important targets, and attackers observing the behavior of the defenders, look for the most advantageous target to harm. The computation of the equilibrium point is a fundamental issue for Stackelberg...
In this research sex and age of the borrower are considered as factors influencing his intention to use lending services and a loan purpose. Target groups of clients are defined through logistic regression modeling. Implication of obtained results allows bank to increase efficiency of its credit policy in the retail market of bank crediting.
Existence of several application specific network technologies like Sensor Networks, Cloud, Personal Area Networks (WPANs), Vehicular Networks (VANETs), Content Delivery Networks and Wifi operating oblivious to each other in the same ISM band creates numerous problems like contention for the same bandwidth leading to excessive collisions and hence lower throughput. This calls for a hybrid mesh framework...
The methodological aspects of building standardized profiles describing the development of a security system that is an integral part of a distributed information system are considered. Functional standardization instruments and the theory of open systems are used.
We present sec-cs, a hash-table-like data structure for contents on untrusted storage that is provably secure and storage-efficient. We achieve authenticity and confidentiality with zero storage overhead using deterministic authenticated encryption. State-of-the-art data deduplication approaches prevent redundant storage of shared parts of different contents irrespective of whether relationships between...
Cameras and other sensors are increasingly deployed for private space monitoring applications such as home monitoring, assisted/enhanced living and child monitoring. Since these cameras capture highly sensitive information and transfer it over public communication infrastructures, security and privacy is a major concern. This work presents a secure camera device along with a secure data delivery and...
This paper surveys the scientific and trade literature on cybersecurity for unmanned aerial vehicles (UAV), concentrating on actual and simulated attacks, and the implications for small UAVs. The review is motivated by the increasing use of small UAVs for inspecting critical infrastructures such as the electric utility transmission and distribution grid, which could be a target for terrorism. The...
With the widespread usage of information and communication technologies rapidly and the increase in data storage and transformation electronically it is very important to provide personal data security and raising security awareness in public. One of the most problematic issues about information technologies are the ones relating with personal and vital data security. Within the context of this study...
Some enterprises would place their core business system in the enterprise network and cut off the connection with the external network, in order to prevent network attacks from outside. Enterprises often need to move business data from the external network to the enterprise network. There will be needs of across-network transmission. In this paper, a one-way transmission technology in network isolation...
To solve the problem of multi-UAV collision avoidance, propose the solution framework of multi-UAV collision avoidance based on the reinforcement learning. Firstly, four elements of state space, action space, the environment model and return value in the multi UAV cooperative collision avoidance problem were analyzed in depth. For the environment model, modeling it from two aspects of the UAV dynamic...
This paper describes a real-time multi-vehicle motion planning (MVMP) algorithm for the emergency vehicle clearance task. To address the inherent limitations of human drivers in perception, communication, and cooperation, we require that the emergency vehicle and the surrounding normal vehicles are connected and automated vehicles (CAVs). The concerned MVMP task is to find cooperative trajectories...
Ontologies play a key role in semanticinteroperability projects, capturing the conceptualizationunderlying the various systems to be integrated. In the case oflarge information systems landscapes, a single monolithicontology often becomes hard to design and maintain. In thissetting, it is common to divide the ontological model inconsistently interlinked modular ontologies, forming anontology network...
Innovations in technology that have enabled efficient wireless tiny devices propelled the concept of Internet of Things. It is expected that mobile data traffic will experience 8-fold growth between 2015 and 2020 and the number of mobile connected devices will reach 11.6 billion by 2020. Main factors of this exponential growth and wide acceptance are the integration of several technologies and communications...
In this study, an active alarm and event notification system that can provide security against theft of motorcycles has been designed. With this system, the owner of the motorcycle will be alerted at the moment of burglary action using the voice dialing method. Burglary action will be more difficult and deterrent when the horn on the bike is activated by the system.
Virtualization is the creation of components, such as hardware platform, operating system, storage, processing power, memory, or network resource, in virtual environments. The applications of virtualization are spreading rapidly and the critical systems are working on virtualization infrastructures. However; the effects of security vulnerabilities which may occur can also be high. In this study, security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.