The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Distributed Denial of Service (DDoS) attacks cause significant damage to computer systems by taking a system offline. Hypertext Transfer Protocol (HTTP), is the most commonly used protocol for web services. The HTTP protocol has recently received a major update to HTTP/2. This new protocol provides increased functionality, however this poses a threat from DDoS due to the larger attack surface. HTTP/2...
The trend in computing is towards the use of FPGAs to improve performance at reduced costs. An indication of this is the adoption of FPGAs for data centre and server application acceleration by notable technological giants like Microsoft, Amazon, and Baidu. The continued protection of Intellectual Properties (IPs) on the FPGA has thus become both more important and challenging. To facilitate IP security,...
Many automotive Remote Keyless Entry (RKE) systems have been successfully attacked in the last few years. The security of RKE systems is still a sensitive and crucial issue for vehicular industry. The problem needs to be essentially addressed by the fundamental fabrication weakness namely: "the manufacture can clone his own fabricated keys" and create equal units. This should not be possible...
In this paper, design of a novel Network on Chip (NoC) structure and its integration with Reliable Reconfigurable Real Time Operating System (R3TOS) are presented. NoC has been recently identified as a scalable communication paradigm to avoid the communication bottleneck in bus based communications. Dynamically Reconfigurable Field Programmable Gate Array (FPGA)s are particularly suited for applications...
The increasing number of autonomous and semi-autonomous vehicles on the road leads to an increasing need for external vehicle communication, in particular through emerging vehicular ad hoc networks also known as VANETs. This technology has the ability to facilitate intelligent transportation applications, comfort and other required services for self-driving vehicles. However, suitable routing protocols...
The misinformation effect demonstrates that when eyewitnesses are exposed to details of a crime that are incorrect, they are less accurate in their later recall of those details. Research has also shown that misinformation has a measurable effect on recall and construction of a target face using a mechanical but now-outdated feature-based composite system. In a laboratory-based psychology experiment,...
Designing a biometrie system based solely on skin texture is of interest because the face is sometimes oeeluded by hair or artefacts in many real-world contexts. This work presents a novel framework for the assessment of skin-based biometric systems incorporating skin quality information. The quality or purity of the extracted skin region is automatically established using pixel colour models prior...
Usually, most of the data generated in real-world such as images, speech signals, or fMRI scans has a high dimensionality. Therefore, dimensionality reduction techniques can be used to reduce the number of variables in that data and then the system performance can be improved. Because the processing of the high dimensional data leads the increase of complexity both in execution time and memory usage...
In the last decades, the explosion of the volume of digital document images, and the development of consumer tools to modify these images, has lead to a huge increase on reported fraudulent document cases. This situation has promoted the development of automatic methods for both preventing forgeries in modified documents and detecting them. However, document forensics is a sensitive topic. Data is...
Emerging computing relies heavily on secure backend storage for the massive size of big data originating from the Internet of Things (IoT) smart devices to the Cloud-hosted web applications. Structured Query Language (SQL) Injection Attack (SQLIA) remains an intruder's exploit of choice to pilfer confidential data from the back-end database with damaging ramifications. The existing approaches were...
Devices aimed for the Internet of Things (loT) market are required to be both low cost and highly secured, as they are expected to be integrated in ordinary "things" while storing and processing sensitive information. In this paper we examine the vulnerabilities of a commercial secured IoT memory chip to precise and localized back-side laser fault injection. We explain the different steps...
The deployment of police super-recognisers (SRs) with exceptional face recognition ability, has transformed the manner in which some forces manage CCTV evidence. In London, SRs make high numbers of sometimes disguised suspect identifications from CCTV. In two experiments measuring immediate and one-week memory of unfamiliar faces in disguise, SRs were more accurate and confident than controls at correctly...
Future Vehicular Ad hoc Networks (VANETs) will be composed of smarter vehicles equipped with various capabilities such as sensing and computing abilities. Connected vehicles can be exploited for resources sharing commonly known as vehicular clouds. Regarding the large number of vehicles in VANET and the variety of resources in each one it seems that resources sharing and cloud computing over VANET...
Most organisations now impose information security policies (ISPs) or ‘conditions of use’ agreements upon their employees. The need to ensure that employees are informed and aware of their obligations toward information security is apparent. Less apparent is the correlation between the provision of such policies and their compliance. In this paper, we report our research into the factors that determine...
Currently, mobile botnet attacks have shifted from computers to smartphones due to its functionality, ease to exploit, and based on financial intention. Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. Therefore, this paper...
This research investigates the feasibility for the development of a novel 3D collision avoidance system for smart powered wheelchairs operating in a cluttered setting by using a scenario generated in a simulated environment using the Robot Operating System development framework. We constructed an innovative interface with a commercially available powered wheelchair system in order to extract joystick...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.