The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The IoT is a technology that enables the inter-connection of smart physical and virtual objects and provides advanced services. Objects or things are generally constrained devices which are limited by their energy, computing and storage capacity. A Wireless Sensor Networks (WSN) is a network composed of devices managed by a CPAN (Personal Area Network Coordinator). The network is used in order to...
The article presents a use case evaluation of the robustness of a physical protection system for the Vodňany water tank, designated as a national critical infrastructure element. The evaluation will be performed based on three probable attack scenarios; the aim of these would be poisoning the drinking water source and intoxication of the population of the nearby city or destruction of the water tank...
The software supply chain is a source of cybersecurity risk for many commercial and government organizations. Public data may be used to inform automated tools for detecting software supply chain risk during continuous integration and deployment. We link data from the National Vulnerability Database (NVD) with open version control data for the open source project OpenSSL, a widely used secure networking...
In the era of big data, massive data has been accumulated in integrated application platform of traffic management of public security. Confidential information leakage is one issue of great importance in the process of data collecting, storing, processing and utilizing. In this work, we propose an anomaly detection approach for the prevention of confidential information leakage. Assume that users'...
Steganography is the science of hiding information to send secret messages using the carrier object known as stego object. Steganographic technology is based on three principles including security, robustness and capacity. In this paper, we present a digital image hidden by using the compressive sensing technology to increase security of stego image based on human visual system features. The results...
Radio frequency fingerprints (RF fingerprints) extraction is a technology that can identify the unique radio transmitter at the physical level by measuring external feature to match with feature library. RF fingerprints is the reflection of differences between hardwares of transmitters, and it contains rich detail characteristics of internal components within transmitter. RF fingerprints has been...
Due to rich characteristics and functionalities, PDF format has become the de facto standard for the electronic document exchange. As vulnerabilities in the major PDF viewers have been disclosed, a number of methods have been proposed to tame the increasing PDF threats. However, one recent evasion exploit is found to evade most of detections and renders all of the major static methods void. Moreover,...
Audio Steganography is the technique of hiding any secret information behind a cover audio file without impairing its quality. Data hiding in audio signals has various applications such as secret communications and concealing data that may influence the security and safety of governments and personnel and has possible important applications in 5G communication systems. This paper proposes an efficient...
Secure interaction amongst system components is inherent to ensure the trustworthiness of the applications. In a distributed system, the attester should know whether the communicating client as well as the user who is using that client system is trustworthy. This can be achieved by a technique called remote attestation. This study presents a three-phase remote attestation protocol which provides relaxation...
Codes that aim to detect any error regardless of its multiplicity are referred to as security oriented codes. Most of these codes are designed to protect uniformly distributed codewords; there are few solutions which are used in protecting systems with non-uniformly distributed words. The paper introduces a new encoding method, termed “Level-Out encoding”, for cases in which some words are more likely...
It is crucial to ensure reliability, security and stability of cloud services without sacrificing too much resources in the area of workload management in clouds. The paper evaluates and compares lightweight decentralized algorithms for scheduling a workload part of which could be unreliable, in the context of {\em heterogeneous} cloud data centers. This unreliability could be caused by various types...
A robust and effective evaluation method for the safety of optimal generation scheduling has great potential on optimizing operation of electrical power and energy system. Based on the concept of transmission capacity margin, a robust model of transmission capacity margin evaluation (TCME) is established to assess the overload risk of transmission lines when loads fluctuate. This TCME method can provide...
Different perspectives about the concept of Robustness in Automotive Electronic are provides by leading edge semiconductor manufacturer. Xilinx contribution is related to the development and evaluation of Software Test Libraries suitable for in-field testing of the interconnect blocks in large SoCs. Infineon (IFX) section is discussing safety and security concerns of On-Line FLASH Memory Repair. STMicroelectronics...
There is an ever-increasing interest in studying temporal networks nowadays, as temporal networks can illustrate the real-world system more accurately. To date, how to characterize nodes' importance is still unclear in temporal networks. In this work, we first use a time window graph model to cut the temporal network into slices, and then we give an indicator for network centrality according to the...
Large-scale infrastructures are critical to economic and social development, and hence their continued performance and security are of high national importance. Such an infrastructure often is a system of systems, and its functionality critically depends on the inherent robustness of its constituent systems and its defense strategy for countering attacks. Additionally, interdependencies between the...
In this paper, we study the secure consensus problem for continuous-time networked multi-agent systems under malicious attacks. Contrary to previous works, we propose a new approach based on an iterative learning control (ILC) strategy to investigate attack tolerant finite-time consensus problems in directed networks. These results are motivated by the need to secure multi-agent networks against cyber...
Existing access control strategies for Internet of Things cannot provide good flexibility, robustness or quick response. We propose an access control approach of finer granularity and techniques supporting bulk operation to make interaction in IoT more flexible. Also, a decentralized strategy and data centric network techniques are used to enhance the system robustness and swiftness. We implement...
Developing means of secure and trustful communications for Vehicular Social Networks (VSN) is essential to enable active information sharing among vehicles. Reputation-based trust management system is a popular security mechanism used in vehicular networks and proven to be robust in many other applications. In this paper, we propose a similarity-based bootstrapping method using analytic hierarchy...
Trust and trustworthiness assessment in cloud computing, as in other areas, is anything but simple, mainly due to the complex and dynamic nature of the cloud, variety of services (e.g., safety-critical or business-critical), large number of relevant quality attributes (e.g., security and performance), and last, but foremost, due to the subjective notion of trust and trustworthiness. In this paper,...
Reliability, security and stability of cloud services without sacrificing too much resources have become a desired feature in the area of workload management in clouds. The paper proposes and evaluates a lightweight framework for scheduling a workload which part could be unreliable. This unreliability could be caused by various types of failures or attacks. Our framework for robust workload scheduling...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.