The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
There is little work which empirically analyses network management practice with respect to policy creation and maintenance. To address this gap we carried out five semistructured interviews of network administrators at a diverse range of enterprises. Analysis of the results led us to make the following contributions: We introduce a number of high-level orthogonal concepts (dimensions) for representing...
This study evaluates the current state of wireless network security in the CBD of Nuku'alofa. Wireless Networks have grown significantly since their introduction. Security protocols supplied with the wireless equipment have reached a level of strong and robust security. However, security remains a problem; this study aims to answer two questions. What is the status of wireless network growth and security...
Background: Software security has drawn immense importance in the recent years. While efforts are expected in minimizing security vulnerabilities in source code, the developers' practice of code cloning often causes multiplication of such vulnerabilities and program faults. Although previous studies examined the bug-proneness, stability, and changeability of clones against non-cloned code, the security...
Operating system level virtualization containers are commonly used to deploy virtual network functions (VNFs) which access the centralized network controller in software-defined networking (SDN) infrastructure. While this allows flexible network configuration, it also increases the attack surface, as sensitive information is transmitted between the controller and the virtual network functions. In...
This paper discusses the open issues in incorporating trust techniques in the NFV environment specified by the ETSI NFV Industry Specification Group, and analyses the available technologies to fill this gap. ETSI is developing security and trust specifications within its NFV-SEC working group, with the aim of establishing and assessing trust of both the hardware platform and the virtualised infrastructure...
Network Function Virtualization (NFV) enables flexible implementation and provisioning of network functions as virtual machines running on commodity servers. Due to the availability of multiple hosting servers, such network functions (also called Virtual Network Functions (VNFs)) can be placed where they are actually needed, dynamically migrated, duplicated, or deleted according to the current network...
The article issue is the enterprise information protection within the internet of things concept. The aim of research is to develop arrangements set to ensure secure enterprise IPv6 network operating. The object of research is the enterprise IPv6 network. The subject of research is modern switching equipment as a tool to ensure network protection. The research task is to prioritize functioning of...
GaAs-based Blocked-Impurity-Band (BIB) detector, as a potential high-sensitive, low noise Terahertz (THz) detector, has been developed for the broad application in the area of THz security check and astronomy mission. In this work, GaAs:Si and GaAs:Te BIB detectors were fabricated. Their responsivity properties were measured at T=3.5K, under different biases and the same black body temperature of...
The Internet of things (IoT) is the natural evolution of the current Internet. As such, IoT systems do not just handle critical information as passwords, identities, personal information, routines, etc., but they also are able to control a whole variety of systems, for instance a robotic network in the automotive industry, autonomous cars networks, human health care and many systems in other domains...
Countering network threats, particularly intrusions, is a challenging area of research in the field of information security. Intruders use sophisticated mechanisms to hide the attack payload and break the detection techniques. To overcome that, various unsupervised learning approaches from the field of machine learning and pattern recognition have been employed. The most popularly used method is Principal...
Recently, several protocols have been proposed to accomplish user authenticity with proper session key establishment in Global Mobility Network. Unfortunately, some of them still suffer from various security threats and high computational complexity. This article demonstrates a new enhanced two-factor authentication scheme for secure anonymous communication to mutually authenticate the communicating...
The trend towards the digitalization of our homes is motivated by the development of hardware and software platforms that have been researched in recent years. As in the Internet of Things, building a single, global platform that enables communication with a myriad of devices for home automation is virtually impossible. The platform proposed in this work deals, in isolation, with the problems in each...
Large Forest Fires are one of the most destructive and recurring natural disaster types around the world, and year after year they leave environmental, material and human irreparable losses in the social nuclei in which they occur. To face them, it is essential to have a Situation Awareness that allows decisions making according to reality, promoting the collaboration between the all involved and...
This work proposes a secure Network-on-Chip (NoC) approach, which enforces the encapsulation of sensitive traffic inside the asymmetrical security zones while using minimal and non-minimal paths. The NoC routing guarantees that the sensitive traffic communicates only through trusted nodes, which belong to a security zone. As the shape of the zones may change during operation, the sensitive traffic...
Many-core architectures are similar to a computer network, where it is necessary to ensure the security during the execution of sensitive applications. This article discusses two security-related issues: the secure admission of applications and the prevention of resource sharing during their execution. The safe application admission is an open research subject for many-core systems. Although several...
Secure message formats and processing for use by Wireless Access in Vehicular Environments (WAVE) devices, including methods to secure WAVE management messages and methods to secure application messages are defined. Administrative functions necessary to support the core security functions are described.
As additive manufacturing (AM) becomes more pervasive, its supply chains shift towards distributed business models that heavily rely on cloud resources. Despite its countless benefits, this paradigm raises significant concerns about the trustworthiness of the globalized process, as there exist several classes of cybersecurity attacks that can undermine its security guarantees. In this work, we focus...
In this paper, a new method for reference network considering network topology optimization is proposed. The actual operation mode optimization and the correction control with transmission switching under the contingency situation are taken into account in the proposed method. Based on the forecasted load values of each period in predictive multi-time scale and candidate transmission line schemes...
Advances in both semiconductor and automotive industry are today enabling the next generation of vehicles with significant electronics content than ever before. Consumers can now avail vehicle offerings in the form of Electric and Hybrid Electric Vehicles (EV/HEV) that have improved fuel efficiency, provide enhanced driver-passenger comfort and experience through Advance Driver Assistance Systems...
Most companies currently carry out security countermeasures against maximum-security risks based on countermeasure cost. However, maximum security is costly and low availability. If we can evaluate and recognize risk dynamically, we can change the security level according to that risk. Therefore, it is possible to lower the security level than maximum security. As a result, availability increases...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.