The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Decentralized and hierarchical microgrid control strategies have lain the groundwork for shaping the future smart grid. Such control approaches require the cooperation between microgrid operators in control centers, intelligent microcontrollers, and remote terminal units via secure and reliable communication networks. In order to enhance the security and complement the work of network intrusion detection...
This study evaluates the current state of wireless network security in the CBD of Nuku'alofa. Wireless Networks have grown significantly since their introduction. Security protocols supplied with the wireless equipment have reached a level of strong and robust security. However, security remains a problem; this study aims to answer two questions. What is the status of wireless network growth and security...
This paper discusses the open issues in incorporating trust techniques in the NFV environment specified by the ETSI NFV Industry Specification Group, and analyses the available technologies to fill this gap. ETSI is developing security and trust specifications within its NFV-SEC working group, with the aim of establishing and assessing trust of both the hardware platform and the virtualised infrastructure...
Advances in both semiconductor and automotive industry are today enabling the next generation of vehicles with significant electronics content than ever before. Consumers can now avail vehicle offerings in the form of Electric and Hybrid Electric Vehicles (EV/HEV) that have improved fuel efficiency, provide enhanced driver-passenger comfort and experience through Advance Driver Assistance Systems...
As the number and variety of cyber threats increase, it becomes more critical to share intelligence information in a fast and efficient manner. However, current cyber threat intelligence data do not contain sufficient information about how to specify countermeasures or how institutions should apply countermeasures automatically on their networks. A flexible and agile network architecture is required...
The methodological aspects of building standardized profiles describing the development of a security system that is an integral part of a distributed information system are considered. Functional standardization instruments and the theory of open systems are used.
The standard and real-time communication technology is an unalloyed inevitability for the development of Internet of Things (IoT) applications. However, the selection of a standard and effective messaging protocol is a challenging and daunting task for any organisation because it depends on the nature of the IoT system and its messaging requirements. Copious messaging protocols have been developed...
Internet of Things (IoT) is slowly taking over the world where its predicted that by 2025, it will grow to 1-3 trillion connected machines/devices. With large scale deployments, maintaining these devices is a seeming burden on the operations. Also, with huge deployments of IoT devices, most concerns center around privacy and security. To reduce the efforts of on-field maintenance and to perform such...
Fraud prevention in the banking sphere is a very important type of activity which can cover a whole range of fraud schemes — both from employees and customers. The article studies the existing technologies for realization of the system of security control over functioning of POS networks in real time and analyzes them in detail. Besides, the concept of the system of monitoring and analysis of threats...
The use of biometrics in smartphones keeps growing. Every day, we use our phones to store sensitive data (such as photos, bank accounts and documents), so we rely on the security manufacturers offer when protecting our private life. It is well known that it is possible to hack into a smartphone using fake fingers made of Play-Doh and other easy-to-obtain materials but, to what extent? Is this true...
In order to build the cross-department and cross-regional road network monitoring and security service platform and related system, we puts forward and research three levels of integration technology. The application of integrated technology is designed and developed to implement the comprehensive application demonstration system of road network management.
The digitalization of modern television broadcasts makes it possible to provide interactive content to consumers over the air. But the hitherto unsecured nature of such broadcasts combined with the ever-increasing complexity of Smart TV software have created an opportunity for attackers to strike at consumers. DVB has updated the relevant standard to allow broadcasters to secure their services against...
Framing Internet of Things (IoT) applications as a System of Systems (SoS) can help us make sense of complexity associated with interoperability and emergence. However, assessing the risk of SoSs is a challenge due to the independence of component systems, and their differing degrees of control and emergence. This paper presents three components for SoS risk assessment that integrate with existing...
Automotive electronic control units (ECUs) have been the focus of many security researchers who have demonstrated the ability to affect the deterministic operation of safety critical vehicle cyber physical systems. Flaws in software design that have direct impacts to the functional safety of a target vehicle have been discovered. The rapid increase in data connectivity within a modern automobile has...
This hands-on tutorial teaches participants how to audit static analysis alerts, using an auditing lexicon and rules. There is no widely-accepted lexicon or standard set of rules for auditing static analysis alerts in the software engineering community. Auditing rules and a lexicon should guide different auditors to make the same determination for an alert. Standard terms and processes are necessary...
The enhanced method of calculating the probability of message compromising in a communication network when using overlapping routes with series-parallel and combined structure are considered. A number of numerical examples have been used to analyze the influence on message compromising of security parameters belonging to certain elements (links) and fragments of the network. It is shown that the proposed...
In the next future, IoT systems will be “ubiquitous” and “pervasive”, bringing several benefits to mankind and also many issues about interoperability, security and privacy. The intrinsic vulnerabilities of IoT devices, with limited resources and heterogeneous technologies, together with the lack of specifically designed IoT standards, represent a fertile ground for the expansion of specific cyber...
One of the popular concepts nowadays is the Internet of Things (IoT). IoT will convert our daily life objects into smart objects. In order to become a part of the IoT network, these smart devices will require some technologies and protocols. In this paper, we will study the different te chnologies that enable the smart objects to be come a part of the IoT network. Furthermore, we will have a look...
Increased interest in security has resulted in greater demand for automated test systems to comply with security standards. Automated test systems have traditionally been operated in isolated environments because of their unique characteristics. However, changes in United States defense acquisition regulations require that defense contractors bring these test systems into compliance with National...
Accurate identification of criminal suspects by witnesses is vital for police investigations. Methods such as Cognitive Interviewing techniques have been employed for this reason to enhance witness recall. In the current project, we demonstrate the benefit of including a focused breathing exercise during face construction using the EvoFIT recognition-based facial composite system. Twenty participants,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.