Results (241)
Search Parameters:
Section: cisMission-Critical Systems Design Framework
Safety-critical systems are well documented and standardized (e.g. IEC 61508, RTCA DO-178B) within system design cycles. However in Defence and Security, systems that are critical to the success of a Mission are not defined within the literature nor are there any guidelines in defining criticality in their design or operational capabilities. When it comes to…
Read MoreThe Internet of Things ecosystem: the blockchain and data protection issues
The IoT is innovative and important phenomenon prone to several services and applications such as the blockchain which an emerging phenomenon. We can describe the blockchain as blockchain as a service because of the opportunity to use several applications based on this technology. We, indeed, should take into account the legal issues related to the…
Read MoreTwo-Stage Performance Engineering of Container-based Virtualization
Cloud computing has become a compelling paradigm built on compute and storage virtualization technologies. The current virtualization solution in the Cloud widely relies on hypervisor-based technologies. Given the recent booming of the container ecosystem, the container-based virtualization starts receiving more attention for being a promising alternative. Although the container technologies are generally considered to be…
Read MoreA Joint Safety and Security Analysis of message protection for CAN bus protocol
One of the prominent challenges of the automotive-transportation system is represented by the integration of security and safety properties within protocols, applications and connectivity mechanisms. A joint safety/security design can sometimes expose to trade-offs, since their requirements may not match perfectly or even be incompatible. This paper analyses an example of security and safety design,…
Read MoreShort CCA-Secure Attribute-Based Encryption
Chosen-ciphertext attacks (CCA) are typical threat on public-key encryption schemes. We show direct chosen-ciphertext security modification in the case of attribute-based encryption (ABE), where an ABE scheme secure against chosen-plaintext attacks (CPA) is converted into an ABE scheme secure against CCA by individual techniques. Our modification works in the setting that the Diffie-Hellman tuple to…
Read MoreFramework for the Formal Specification and Verification of Security Guidelines
Ensuring the compliance of developed software with general and application-specific security requirements is a challenging task due to the lack of automatic and formal means to lead this verification. In this paper, we present our approach that aims at integrating the formal specification and verification of security guidelines in early stages of the development lifecycle…
Read MoreBuilding an Efficient Alert Management Model for Intrusion Detection Systems
This paper is an extension of work originally presented in WITS-2017 CONF. We extend our previous works by improving the Risk calculation formula, and risk assessment of an alert cluster instead of every single alert. Also, we presented the initial results of the implementation of our model based on risk assessment and alerts prioritization. The…
Read MoreA Multilingual System for Cyberbullying Detection: Arabic Content Detection using Machine Learning
With the abundance of Internet and electronic devices bullying has moved its place from schools and backyards into cyberspace; to be now known as Cyberbullying. Cyberbullying is affecting a lot of children around the world, especially Arab countries. Thus concerns from cyberbullying are rising. A lot of research is ongoing with the purpose of diminishing…
Read MoreDistributing the computation in combinatorial optimization experiments over the cloud
Combinatorial optimization is an area of great importance since many of the real-world problems have discrete parameters which are part of the objective function to be optimized. Development of combinatorial optimization algorithms is guided by the empirical study of the candidate ideas and their performance over a wide range of settings or scenarios to infer…
Read MoreCognitive Cybernetics vs. Captology
In acronym Captology – Computers as Persuasive Technology, a persuasive component (lat. persuasibilibus – enticing) refers to the persuasive stimulation by intelligent technologies. Latter being transitive and interactive as intelligent systems, they have imposed, by their persuasivity, a ‘cult of information’, after which information has become a type of goods that as a utilitarian resource…
Read MoreA Cost Effective Security Technology Integrated with RFID Based Automated Toll Collection System
Crime statistics and research on criminology show that under similar circumstances,crimes are more likely to occur in developing countries than in developed countries due to their lack ofsecurity measures. Transport crimes on highways and bridges are one of the most common crimes in the developing nations. Automation of various systems like the toll collection system…
Read MorePluggable Controllers and Nano-Patterns in Java with Lola
Pluggable controllers are a different way to design control constructors such as if, while, do, switch, and operators such as short circuit con-junction (&&) and the “?.” operator of the Swift programming language. Adoption of pluggable controllers enables the final user to modify and extend the control flow constructs (if, while, etc.) of an underlying…
Read MoreOn the Performance of a Clustering-based Task Scheduling in a Heterogeneous System
Recent task scheduling algorithms for a generalized workflow job in heterogeneous system adopt list-based scheduling. In those algorithms, the response time cannot be effectively reduced if the given workflow job is data-intensive. If the workflow job is computationally intensive, an attempt is made to assign tasks to many processors, which can lead to resource starvation.…
Read MoreAn Efficient Authentication Method For Smart Card Verification In Online
The great cards are getting a charge out of a critical part inside the on-line managing wherever we have tendency to can’t check the cardholder up close and personal. The phishing sites may parody the data in the middle of the customer website and along these lines the common webpage. To protect the data and…
Read MoreA Machine Learning based Framework for Parameter based Multi-Objective Optimisation of Video CODECs
All multimedia devices now incorporate video CODECs that comply with international video coding standards such as H.264 / MPEG4-AVC and the new High Efficiency Video Coding Standard (HEVC), otherwise known as H.265. Although the standard CODECs have been designed to include algorithms with optimal efficiency, a large number of coding parameters can be used to…
Read MoreSource Code Vulnerabilities in IoT Software Systems
An empirical study that examines the usage of known vulnerable statements in software systems developed in C/C++ and used for IoT is presented. The study is conducted on 18 open source systems comprised of millions of lines of code and containing thousands of files. Static analysis methods are applied to each system to determine the…
Read MoreProposal for a Visualization System of Purchase Relationship Using ID-POS Data
In recent years, big data analysis is gaining immense credence in the fields of academics and business. Businesses such as management and marketing have demonstrated a strong inclination and interest in data analytics. However, many businesses are unable to utilize data even if they have access to it. The main reason for that is the…
Read MoreTowards Deployment Strategies for Deception Systems
Network security is often built on perimeter defense. Sophisticated attacks are able to penetrate the perimeter and access valuable resources in the network. A more complete defense strategy also contains mechanisms to detect and mitigate perimeter breaches. Deceptive systems are a promising technology to detect, deceive and counter infiltration. In this work we provide an…
Read MoreEfficient Tensor Strategy for Recommendation
The era of big data has witnessed the explosion of tensor datasets, and large scale Probabilistic Tensor Factorization (PTF) analysis is important to accommodate such increasing trend of data. Sparsity, and Cold-Start are some of the inherent problems of recommender systems in the era of big data. This paper proposes a novel Sentiment-Based Probabilistic Tensor…
Read MoreIoT: Their Conveniences, Security Challenges and Possible Solutions
The build-in internet-controlled functions of smart devices such as smart phone, smart television, home healthcare gadget, etc., have made them quite attractive to many segments of consumers. In recent years mankind has witnessed an upsurge usage of such devices for numerous purposes. In this paper, the author is going to show how previously forecasted security…
Read MorePrecision Statistical Analysis of Images Based on Brightness Distribution
Study the content of images is considered an important topic in which reasonable and accurate analysis of images are generated. Recently image analysis becomes a vital field because of huge number of images transferred via transmission media in our daily life. These crowded media with images lead to highlight in research area of image analysis.…
Read MoreImproving the Performance of Fair Scheduler in Hadoop
Cloud computing is a power platform to deal with big data. Among several software frameworks used for the construction of cloud computing systems, Apache Hadoop, which is an open-source software, becomes a popular one. Hadoop supports for distributed data storage and the process of large data sets on computer clusters based on a MapReduce parallel…
Read MoreOptimal Plant Growth in Smart Farm Hydroponics System using the Integration of Wireless Sensor Networks into Internet of Things
Greenhouse cultivation is easy to keep up and control important factors such as light, temperature, and humidity. Using of sensors and actuators in the greenhouse to capture different values allows for the control of the equipment, it can also be optimized for growth at optimal temperature and humidity of various crops planted. We use wireless…
Read MoreGraphics on demand: the automatic data visualization on the WEB
Data visualization is an effective tool for communicating the results of opinion surveys, epidemiological studies, statistics on consumer habits, etc. The graphical representation of data usually assists human information processing by reducing demands on attention, working memory, and long-term memory. It allows, among other things, a faster reading of the information (by acting on the…
Read MoreFeatures based approach for indexation and representation of unstructured Arabic documents
The increase of textual information published in Arabic language on the internet, public libraries and administrations requires implementing effective techniques for the extraction of relevant information contained in large corpus of texts. The purpose of indexing is to create a document representation that easily find and identify the relevant information in a set of documents.…
Read More
