The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper combines FMEA and n2 approaches in order to create a methodology to determine risks associated with the components of an underwater system. This methodology is based on defining the risk level related to each one of the components and interfaces that belong to a complex underwater system. As far as the authors know, this approach has not been reported before. The resulting information from...
Information technology is increasingly being used in healthcare paramedic sector with the goal to improve management of resources and enhance medical services to save lives. In this paper, we introduce EMTriage, a distributed Android application with the ability to access patients EHR's, and depending on the data and inputs, assess and distribute an acuity level to patients in need of resources. We...
Background: Software security has drawn immense importance in the recent years. While efforts are expected in minimizing security vulnerabilities in source code, the developers' practice of code cloning often causes multiplication of such vulnerabilities and program faults. Although previous studies examined the bug-proneness, stability, and changeability of clones against non-cloned code, the security...
Stackelberg security games are represented by a Stackelberg model for multiple defenders and attackers. The dynamics of the game involves defenders trying to allocate their limited resources to defend important targets, and attackers observing the behavior of the defenders, look for the most advantageous target to harm. The computation of the equilibrium point is a fundamental issue for Stackelberg...
With the widespread usage of information and communication technologies rapidly and the increase in data storage and transformation electronically it is very important to provide personal data security and raising security awareness in public. One of the most problematic issues about information technologies are the ones relating with personal and vital data security. Within the context of this study...
Whenever users install a new application on their smart devices with an Android KitKat or Lollipop operating system they are asked to grant the application (app) provider access to features of the device, ranging from data storage to device location and from device identity to the users personal contacts. The implications on users' privacy and security are significant and therefore the users' ability...
Restriction of communication area is preferable in view point of security. In this paper, a communication area restriction method is proposed. In the proposed method, binomial coefficient array for transmitting and for jamming is used. In the conventional method, the beam for jamming was formed using 2 elements; while in this paper, the beam is formed using 8 elements binomial array. As a result of...
It has been recognized that current phishing filters in existence today are steadily lacking in effectiveness. Furthermore, users and organizations are lacking appropriate security policies and education, which has led to massive reports of data and privacy breaches in organizations. To address this issue, a phishing filter is proposed which will build upon and broaden the scope of existing techniques...
Machine Type Communications (MTC) collectively refers to the exchange of data among devices that operate without human intervention. A significant number of such devices are currently served by cellular networks, and that number is expected to grow in the near future. However, cellular networks, including current fourth generation LTE networks, face several challenges when it comes to handling MTC...
Cloud computing is growing rapidly due to its features of low cost, space saving, sharing etc., yet security issues are still a major concern. Multi-cloud computing technology was developed, in part, to address security concerns. One technique could use the Shamir's secret sharing method which is based on risk diversification. This work offers a solution strategy allowing users to allocate their resources...
Nowadays, coins and banknotes are familiar to us and, on a daily basis, we make cash payments of small amounts of less than 10 Euros. However, concerning high amounts, we cannot pay for everything in cash: firstly because the conservation of cash is risky and, secondly, in the case of loss or fraud, there is no recourse. Therefore, according to several recent studies, the most preferred and used method...
There are several reports and white papers which attempt to precise 5G architectural requirements presenting them from different points of view, including techno-socio-economic impacts and technological constraints. Most of them deal with network slicing aspects as a central point, often strengthening slices with slice isolation. The goal of this paper is to present and examine the isolation capabilities...
In this paper, we present the TARZAN platform, an integrated platform for analysis of digital data from security incidents. The platform serves primarily as a middleware between data sources and data processing applications, however, it also provides several supporting services and a runtime environment for the applications. The supporting services, such as a data storage, a resource and application...
Kademlia is a widely successful Distributed Hash Table (DHT) implementation, better known for its use in the BitTorrent protocol. In this paper, we revisit its overlay management separately from the DHT operations to allow it to be used with other distributed abstractions by providing an accurate and consistent view of the k-closest nodes to any given identifier. We then present invariants that avoid...
In this paper, we present some preliminary results on a user study which was geared to obtain a better understanding for the relevance and impact of how the media reports on data breaches. Specifically, we conducted a study to investigate whether or not there is a correlation between the media coverage of data breaches and the perceived data breach fatigue among the general public.
Nowadays, providing a security system for houses has become a vital research in which the latest technologies are being adopted to serve this purpose. Wireless network is one of the technologies that have been used to provide remote monitor and control for the home appliances. This paper aims to propose a security door lock system based on Raspberry pi technology where cameras, keypad and pi-lids...
This paper is an extension of my earlier paper [1]. It examines the continuing growth of this problem, and the likelihood that it will continue to get worse. Since the previous paper, the author was contacted by a lawyer involved in litigating a dispute related to TLDs. As noted in the previous paper, misdirected communication has obvious security and privacy ramifications and is an age old problem...
In this paper we present the report on the design and development of a platform for the inter-generational exchange of favors. This platform was designed using participatory design approach during a 24-hour hackathon by a team consisting of younger programmers and older adults. The findings of this report show that inter-generational cooperation in which the older adults serve as representatives of...
Software Defined Networking (SDN) is a new networking paradigm which provides better decoupling between control plane and data plane. The separation not only allows OpenFlow (OF) switches in the data plane simply to forward data, but also enables the centralized programmable controller to control the behavior of entire network. SDN makes it possible to manage the network more flexible and simple....
Motivated by applications to security and high efficiency, we propose an automated methodology for validating on low-level intermediate representations the results of a source-level static analysis. Our methodology relies on two main ingredients: a relative-safety checker, an instance of a relational verifier which proves that a program is "safer" than another, and a transformation of programs...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.