The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Differential power processing (DPP) is a promising architecture to solve an issue caused by mismatch among PV modules. PV to non-isolated port bus (or PV to the virtual bus) is one of the topologies studied in DPP architecture that allows each DPP converters can achieve maximum power point tracking (MPPT) independently. The string current value does not have an effect on MPPT but relates to the power...
The accuracy provided by traditional sampling-based monitoring approaches, such as NetFlow, is increasingly being considered insufficient to meet the requirements of today's networks. By summarizing all traffic for specific statistics of interest, sketch-based alternatives have been shown to achieve higher levels of accuracy for the same cost. Existing switches, however, lack the necessary capability...
Attacks authored by state sponsored actors, criminal outfits, ideological enclaves and recreational hackers continue to trouble public and private cyber systems. In order to create and/or maintain an advantage over their adversaries, cyber defenders must pursue novel ways to detect, attribute and respond to offensive operations. Linkography is a topic that has been explored for decades that has found...
Software Defined Wireless Sensor Network (SDWSN) is realised by infusing Software Defined Network (SDN) model in Wireless Sensor Network (WSN), Reason for that is to overcome the challenges of WSN. Artificial Intelligence (AI) and machine learning play an important role in our society, give rise to systems that can manage themselves. WSNs have been used in various industrial applications, where reliability...
Nowadays, there are many serious cyber security threats such as viruses, worms and trojans but without a doubt botnets are one of the largest threats. Although there are numerous ways to discover botnets and mitigate their effects, most methods have problems effecting detection, due to their evasive characteristics. Also, the majority of previous research uses only one data source (e.g. network traffic),...
There is a desire to detect and assess unmanned aerial systems (UAS) with a high probability of detection and low nuisance alarm rates in numerous fields of security. Currently available solutions rely upon exploiting electronic signals emitted from the UAS. While these methods may enable some degree of security, they fail to address the emerging domain of autonomous UAS that do not transmit or receive...
Web applications can leak confidential user information due to the presence of unintended side-channel vulnerabilities in code. One particularly subtle class of side-channel vulnerabilities arises due to resource usage imbalances along different execution paths of a program. Such side-channel vulnerabilities are especially severe if the resource usage imbalance is asymptotic. This paper formalizes...
An improved ant colony algorithm is proposed in the actual storage environment on the basis of safety and stability. Keeping the omni-directional mobile vehicle away from obstacles is concerned first in order to reduce the risk of collision in consideration of the car size and the diversity of the obstacle species. Then, redundant points are simplified in the path and fewer inflection path is filtered...
This work presents a novel scheme which reinforces strength of encryption keys in low-power and low-rate wireless sensor networks (WSNs). The proposed algorithm utilizes pseudo-random features of physical layer (PHY) of the communication stack to enable time-evolution of network keys increasing their complexity and reliability. This scalable and light-weight scheme is suitable for large networks of...
The Development of technological system have grown up rapidly including how to vote. In general, people are accustomed to vote by using ballot paper. In Indonesia, this way is considered ineffective both in terms of cost, time, and governance. Due to this, the creation of an electronic voting system or known as e-voting based on android for the voting system implemented can be performed more easily...
Applications in computer network security, social media analysis, and other areas rely on analyzing a changing environment. The data is rich in relationships and lends itself to graph analysis. Traditional static graph analysis cannot keep pace with network security applications analyzing nearly one million events per second and social networks like Facebook collecting 500 thousand comments per second...
The advances made in the field of IoT in recent years implore us to take a closer look at the security challenges it presents. Due to its ubiquitous nature and high heterogeneity of the connected devices and communication protocols a novel approach must be taken. This papers aim is to make a brief review of the work done in the areas of Negative Selection and Danger Theory and to do a comparative...
The creation of intrusion detection systems for IoT scenarios presents various challenges. One of them being the need for an implementation of unsupervised learning and decision making in the detection syste1m. The algorithm presented in this paper is capable of definitively identifying a large percentage of possible intrusions as true or false without the need of operator input. Our proposal is based...
The tree-based tags anti-collision algorithm is an important method in the anti-collision algorithms. In this paper, several typical tree algorithms are evaluated. The comparison of algorithms is summarized including time complexity, communication complexity and recognition, and the characteristics and disadvantages of each algorithm are pointed out. Finally, the improvement strategies of tree anti-collision...
Compared to other remote attestation methods, the binary-based approach is the most direct and complete one, but privacy protection has become an important problem. In this paper, we presented an Extended Hash Algorithm (EHA) for privacy protection based on remote attestation method. Based on the traditional Merkle Hash Tree, EHA altered the algorithm of node connection. The new algorithm could ensure...
With the growth of the known malware to more than 600 millions according to AVTest this year, every security solution developed different methods for detecting malicious content. Whether this method consists in signature based detection, emulation, heuristics or different techniques of machine learning, one thing remains a constant in this procedure: a need for a cleanset — a large collection of clean...
Steganography is the technique of hiding confidential information within a cover media in such a way that a third party cannot discern the presence of the hidden message. In the existing system, a single scrambled image is used as a cover media. It is partitioned into two areas-the embedding area in which confidential information is embedded and the non-embedding area, which contains the location...
Analysis of in-vehicle networks is an open research area that gained relevance after recent reports of cyber attacks against connected vehicles. After those attacks gained international media attention, many security researchers started to propose different algorithms that are capable to model the normal behaviour of the CAN bus to detect the injection of malicious messages. However, despite the automotive...
Automatic tools based on symbolic models have been successful in analyzing security protocols. Such tools are particularly adapted for trace properties (e.g. secrecy or authentication), while they often fail to analyse equivalence properties.Equivalence properties can express a variety of security properties, including in particular privacy properties (vote privacy, anonymity, untraceability). Several...
The existing privacy-preserving data aggregation methods in wireless sensor networks (WSNs) generally rely on a network infrastructure, and data privacy is achieved by encryption techniques. However, such an infrastructure is very susceptible to the dynamic network topologies, and excessive encryption process causes a high energy consumption and re-duces the accuracy of the aggregation results. In...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.