The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software Defined Networking (SDN) presents a unique opportunity to manage and orchestrate cloud networks. The educational institutions, like many other industries face a lot of security threats. We have established an SDN enabled Demilitarized Zone (DMZ) — Science DMZ to serve as testbed for securing ASU Internet2 environment. Science DMZ allows researchers to conduct in-depth analysis of security...
The large quantities of alerts generated by intrusion detection systems (IDS) make very difficult to distinguish on a network real threats from noise. To help solving this problem, we propose VEGAS, an alerts visualization and classification tool that allows first line security operators to group alerts visually based on their principal component analysis (PCA) representation. VEGAS is included in...
In this talk we seek to provide insight on the general topic of visual soft biometrics (gender, age, ethnicity, etc.). First, we present a new refined definition of soft biometrics, emphasizing on the aspect of human compliance, and then proceed to identify candidate traits that accept this novel definition. Second, we introduce some image processing techniques related to the estimation of some traits...
This paper presents the result of the work achieved in the frame of three successive European Projects, which aimed to build an innovative system to assist security managers in the crisis preparation, training and management phases. The iterative approach of the consortium is presented, as well as the results. A novel interactive and shared Common Operational Picture is proposed which has been validated...
This paper presents a liveness detection method based on tracking the gaze of the user of a face recognition system using a single camera. The user is required to follow a visual animation of a moving object on a display screen while his/her gaze is measured. The visual stimulus is designed to direct the gaze of the user to sets of collinear points on the screen. Features based on the measured collinearity...
Network scans visualization provides very effective means for to detection large scale network scans. Many visualization methods have been developed to monitor network traffic, but all the techniques or tools still heavily rely on human detection. They seldom consider the importance of network event characteristics to the network data visualization, and cannot detect slow scans, hidden scans etc....
Nowadays, a great amount of information is circulated through the Internet. Some of them exclusively belongs to a special group of users and requires protection and safeguarding against unauthorized access. To this end, a category of systems called HIP (human interactive proof) have been introduced to distinguish between various groups of users.
Exposing students to research topics enhances their learning experience. It is therefore desirable for instructors to include a research component into their courses. The courses most prone for incorporating research components are the upper level undergraduate and graduate courses. However, this becomes challenging in the case of introductory courses, where learning new programming skills is the...
Visualization tools can be an effective and entertaining means to teach students concepts in the class room. Providing accessibility to the tools allows motivated students to interact “live” with visualizations. Security protocols are an important concept in teaching information and network security. Students need to understand both the sequence of passed information, computations and analysis. In...
This paper presents an architecture to support fast prototyping of augmented reality systems, based on virtual reality. The architecture defines simulation services separated from other aspects of the system. These services support incremental evolution of simulated prototypes into nonsimulated systems. Focus is also placed on user interaction,through the definition of an interaction architecture...
Software security testing tools and methodologies are presently abundant, and the question no longer seems to be "if to test" for security, but rather "where and when to test" and "then what?". In this paper we present a review of security testing literature, and propose a software security testing scheme that exploits an intra-organisational repository of discovered...
Hidden functionality in software is a big problem, because we cannot be sure that the software does not contain malicious code. We conducted an experiment where we studied the relationship between architecture constructs, dynamic behavior and security vulnerabilities. We also studied to what extent architecture analysis tools can assist in detecting security vulnerabilities that are caused by architecture...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.