The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cooperative spectrum sensing, despite its effectiveness in enabling dynamic spectrum access, suffers from location privacy threats, merely because secondary users (SUs)' sensing reports that need to be shared with a fusion center to make spectrum availability decisions are highly correlated to the users' locations. It is therefore important that cooperative spectrum sensing schemes be empowered with...
Smart environments such as smart grid, smart transportation, smart buildings are upon us because of major advances in sensor, communication, cloud and other cyber-physical system technologies. The collective name for interconnected sensors, placed on "things" within fixed cyber-physical infrastructures, is Internet of Things (IoT). IoT enables cities and rural areas to become smarter and...
The aim of this paper is to present a taxonomy for security threats on the Web ecosystem. We proposes a classification model based on 21 vectors divided into 8 distinct security threats, making use of levels of abstraction and criteria for discrimination which consider propagation and similarity in vulnerabilities. We also propose to estimate the risk factor and impacts on assets, considering data...
As the adoption of Cloud Computing is growing exponentially, a huge sheer amount of data is generated therefore needing to be processed in order to control efficiently what is going within the infrastructure, and also to respond effectively and promptly to security threats. Herein, we provide a highly scalable plugin based and comprehensive solution in order to have a real-time monitoring by reducing...
Covert channels are used for information transmission in a manner that is not intended for communication and is difficult to detect. The authors have proposed and explored the way to counter the leakage of information via covert channels by introducing additional random delays before packets' sending. The main topic of the research is the case when the capacity of the covert channel without error...
Security watchstanders who monitor multiple videos over long periods of time can be susceptible to information overload and fatigue. To address this, we present a configurable perception pipeline architecture, called the Image Surveillance Assistant (ISA), for assisting watchstanders with video surveillance tasks. We also present ISA1, an initial implementation that can be configured with a set of...
Before deploying their infrastructure (resources, data, communications, ) on a Cloud computing platform, companies want to be sure that it will be properly secured. At deployment time, the company provides a security policy describing its security requirements through a set of properties. Once its infrastructure deployed, the company want to be assured that this policy is applied and enforced. But...
The use of cloud computing for AEC (Architecture/ Engineering/ Construction) projects has been intensively explored in recent research. Companies have adopted cloud computing for storing the massive amount of data that the AEC industry generates. In most cases these cloud systems are private, isolated and limited in terms of the actual computing operations. With the emergence of "multi-Clouds"...
Context based Mobile Information Catalog Surveillance is a mobile phone based communication application. This application will give the notification to the user whenever they want to communicate with their mobile virtually. This application proved to get the recent call logs details when you send a command as message to the Android mobile device. It is used on Business point of view surveillance and...
The deployment of applications able to consume cloud infrastructure services is currently a tedious process especially when it should be often repeated in the application developing phase. We present a technical solution that simplifies the deployment process, as being almost fully automated. Its integration as a module of an open-source platform for enforcing security controls by its users is further...
Vehicular Networks (VANET) are the largest real life application of ad-hoc networks where nodes are represented via fast moving vehicles. As VANET is characterised with several unique features such as the high mobility, random distribution and short connection times, etc. establishing security becomes very challenging, and identifying security threats and possible attacks become very critical. Thus,...
This paper introduces and evaluates a Traffic Sign Management Architecture (TSMA), which represents a paradigm shift for the deployment of traffic sign infrastructure in the context of Intelligent Transport Systems, Vehicular Networks and Smart Cities. The proposal addresses limitations of the current traffic control model by enabling remote updates of traffic signs and displaying them on the vehicular...
This paper describes the lessons learned during a study performed by the Johns Hopkins University Applied Physics Laboratory for the Department of Defense Chief Information Officer/Cyber-security. The purpose of the study was to (1) define a systems security engineering process that takes into consideration concepts from capability-based threat modeling, the Risk Management Framework, and the evolving...
For information dissemination in highly dynamic vehicular networks, two technological approaches can be considered: Cellular communication standards are continually evolving to incorporate the requirements of vehicular applications. An alternative is ad-hoc communication which is restricted to direct, short range communication between vehicles/road-side units. Currently, no single technology can fulfill...
By nature, cloud computing systems are static, homogenous entities. They consist of multiple layers of hardware and software resources. These resources are organized into stacks which provide services to end users. Many service stacks are built from a single template. As a result, they consist of identical resources with identical configurations. This gives potential attackers the asymmetric advantage...
In recent years, security attacks on the web have been perpetrated by hacker activist organizations that aim to destabilize (using different techniques) web services in a specific context for which they are motivated. Predicting these attacks is an important task that helps to consider what actions should be taken if the attack is latent. Although there are applications to detect security threats...
Despite recent emerging development in intrusion detection or network monitoring, malicious attacks and misbehavior remain a high-risk issue within network traffic. In this paper, we present a proactive solution called MMT (Montimage1 Monitoring Tool) that allows facilitating network security and performance monitoring and operation troubleshooting. We demonstrate the improvements of MMT in comparison...
Biometric technologies have the potential to reduce the effort involved in securing personal activities online, such as purchasing goods and services. Verifying that a user session on a website is attributable to a real human is one candidate application, especially as the existing CAPTCHA technology is burdensome and can frustrate users. Here we examine the viability of biometrics as part of the...
Transdisciplinary collaboration is evolving rapidly in the context of addressing issues and solving complex problems. In addition, such collaboration requires continuous learning and knowledge sharing among the collaborators. Technology advances have enabled the design and development of cloud based collaborative learning and teaching solution. This paper discusses the technology architecture components...
The emerging and much-touted Internet of Things (IoT) presents a variety of security and privacy challenges. Prominent among them is the establishment of trust in remote IoT devices, which is typically attained via remote attestation, a distinct security service that aims to ascertain the current state of a potentially compromised remote device. Remote attestation ranges from relatively heavy-weight...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.