The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Neural networks provide state-of-the-art results for most machine learning tasks. Unfortunately, neural networks are vulnerable to adversarial examples: given an input x and any target classification t, it is possible to find a new input x' that is similar to x but classified as t. This makes it difficult to apply neural networks in security-critical areas. Defensive distillation is a recently proposed...
Contrary to traditional evolutionary models of complex networks a novel consideration with two-formation & degradation — phases has been proposed. To clarify which of the stages of the phases are more sensible the evolving network has been put to simulated attacks. A novel integral vulnerability metrics has been proposed which demonstrated strong dependence on the network growth rate of the stage...
Higher species diversity in biological systems increases the robustness of the system against the spread of disease or infection. However, computers are remarkably less diverse. Such lack of diversity poses serious risks to the today's homogeneous computer networks. An adversary learns with the initial compromises and then applies the learned knowledge to compromise subsequent systems with less effort...
Liveness detection is a rapidly expanding research area, an area that has become more relevant, due to the increased complexity and sophistication of spoofing attacks. Despite much research within liveness detection, a lack exists regarding the categorisation of liveness detection techniques. Therefore the development of a taxonomy that identifies the characteristics of liveness detection, and creates...
There is a need for robust and effective trust management. Different security problems result in different requirements to the design of trust management, and the existing attacks in trust management for security are yet to be solved. In this paper, we first propose a framework to classify desired properties of trust management for each type of security problems. We then investigate typical representative...
Sphinx was a monster in Greek mythology devouring those who could not solve her riddle. In VoIP, a new service in the role of Sphinx provides protection against SPIT (Spam over Internet Telephony) by discriminating human callers from botnets. The VoIP Sphinx tool uses audio CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) that are controlled by an anti-SPIT policy...
The increasing complexity of software and IT systems creates the necessity for research on technologies addressing current key security challenges. To meet security requirements in IT infrastructures, a security engineering process has to be established. One crucial factor contributing to a higher level of security is the reliable detection of security vulnerabilities during security tests. In the...
In cognitive radio (CR) systems communication is not restricted to pre-assigned channels, but is rather able to opportunistically detect and use appropriate portions of spectrum. Although much research effort has been put into this new technology, the technical focus has been mainly directed towards pushing further the attainable spectral efficiency gains. Taking a step back, our work looks into the...
Among the steganographic techniques and particularly in conventional least significant bit (LSB) insertion method, there is a challenging issue and that is how to embed desired secret bits in a cover medium (a typical 8-bit gray-scale image) in a way not to be seen by human vision system as well as the fact that it is expected not to be attacked by some attacks like chi-squared attack, etc. The point...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.