Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Tor, uses a protocol aimed at ensuring anonymity by distributing its communication over relays all over the world. This protocol designed to protect the privacy of Internet users from traffic analysis attacks launched by an adversary. The studies in the literature have shown that some attacks can be performed in the hidden service relays, or in exit nodes of services by eliminating anonimity. In this...
The revolutionary network that totally changed how the humankind life, the Internet, is now evolving into the Internet of things; which is being achieved by fetching the network connectivity to legacy industrial or commercial devices, as well as everyday objects. This connectivity may be an Internet connection, where the Internet protocol and related technologies are in use. But, there are also many...
With he rapid development of the mobile Internet industry, information security based on trusted computing is also becoming increasingly serious. Considering that most of the existing research is based on the static security measure, and based on the server and PC side, a security operation environment measurement framework based on mobile terminal is proposed in this paper to alleviate the information...
The standard and real-time communication technology is an unalloyed inevitability for the development of Internet of Things (IoT) applications. However, the selection of a standard and effective messaging protocol is a challenging and daunting task for any organisation because it depends on the nature of the IoT system and its messaging requirements. Copious messaging protocols have been developed...
We evaluated the support proposed by the RSO to represent graphically our EAM-ISSRM (Enterprise Architecture Management - Information System Security Risk Management) integrated model. The evaluation of the RSO visual notation has been done at two different levels: completeness with regards to the EAM-ISSRM integrated model (Section III) and cognitive effectiveness, relying on the nine principles...
Architecture models mainly have three functions; 1) document, 2) analyze, and 3) improve the system under consideration. All three functions have suffered from being timeconsuming and expensive, mainly due to being manual processes in need of hard to find expertise. Recent work has however automated both the data collection and the analysis. In order for enterprise architecture modeling to finally...
Transmission techniques based on channel coding with feedback are proposed in this paper to enhance the security of wireless communications systems at the physical layer. Reliable and secure transmission over an additive noise Gaussian wiretap channel is investigated using Bose-Chaudhuri-Hocquenghem (BCH) and Low-Density Parity-Check (LDPC) channel codes. A hybrid automatic repeat-request (HARQ) protocol...
The reciprocity of the wireless and the randomness of channel characteristic is the basis of physical layer key generation technology based on the channel. The complete key generation technologies include five steps that channel probing, channel feature extraction, quantification, reconciliation and privacy application. There are many theories and simulation prove the feasibility of key extraction...
Attack graphs constitute a powerful security tool aimed at modelling the many ways in which an attacker may compromise different assets in a network. Despite their usefulness in several security-related activities (e.g. hardening, monitoring, forensics), the complexity of these graphs can massively grow as the network becomes denser and larger, thus defying their practical usability. In this presentation,...
With the progress of the network and technology, the perfect combination of mobile intelligent terminal and internet, people are increasingly dependent on intelligent terminals. So, it was very necessary of a model for assessing the security performance of mobile intelligent terminals, especially to establish the objective model of the security performance of mobile intelligent terminal. In this paper,...
In this paper a physical layer transmission method based on the channel prediction and users quality-of-service(QoS) is proposed. The time-varying Rayleigh fading channel is predicted by back propagation neural network (BPNN), which will serve as judging whether the system secure transmission capacity is redundant. Then a scheme to choose the best physical layer security coding under the secure transmission...
We show that it is possible to achieve information theoretic location privacy for secondary users (SUs) in database-driven cognitive radio networks (CRNs) with an end-to-end delay less than a second, which is significantly better than that of the existing alternatives offering only a computational privacy. This is achieved based on a keen observation that, by the requirement of Federal Communications...
Industry is continuously moving towards the employment and exploitation of semantic technologies due to diverse enterprise needs, such as cross-domain interoperability, system modeling, categorization of information, model validation and data reasoning. Therefore, the research community presents new semantic-based approaches for implementing industrial systems that are more flexible, self-descriptive,...
With the rapid development of bulk power grid under extra-high voltage (EHV) AC/DC hybrid power system and extensive access of distributed energy resources (DER), operation characteristics of power grid have become increasingly complicated. To cope with new severe challenges faced by safe operation of interconnected bulk power grids, an in-depth analysis of bulk power grid security defense system...
Molecular communication in nanonetworks is an emerging communication paradigm that uses molecules as information carriers. Achieving a secure information exchange is one of the practical challenges that need to be considered to address the potential of molecular communications in nanonetworks. In this article, we have introduced secure channel into molecular communications to prevent eavesdropping...
In this work, we propose a full-duplex relay (FDR) network for secure communication in the presence of an eavesdropper. We consider both the destination and the amplify-and-forward relay has a full-duplex capability for a higher rate and/or a stronger secrecy performance. In particular, the destination transmits a cooperative jamming signal while receiving the relayed signal. To get analytic understanding,...
Provides an abstract of the tutorial presentation and may include a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings.
Quantum key distribution (QKD) enables two authenticated parties to share secret keys with the ability to detect any attempts to eavesdrop the keys theoretically. Currently, QKD systems can be categorized by its source of uncertainty in nature; single photon or coherent light. As coherent light is harnessed, the overall cost for composing systems drops in general. However, more elaborate post processing...
A unidirectional security gateway is a network system in which data can travel in only one direction. Therefore, the system are used in protecting the safety and reliability of various critical infrastructures. Most of all, it has to be deployed with send and receive transceivers disconnected for one direction to ensure information security. In this paper, we introduce a unidirectional security gateway...
The wide spread use of Internet allows advertisers to reach significantly more consumers through online advertisement compared to traditional advertising media. However, currently online advertisement is facing challenges associated with advertisement (ad) frauds such as ad replacement, ad stacking, click fraud, and click hijacking. It is important to teach students this emerging topic, and help students...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.