Search results for "Computer security"

showing 10 items of 433 documents

An Investigation of the Energy Consumption by Information Technology Equipments

2013

The World Wide Web and the rise of servers and PC's data centers have become a major position in the overall power consumption of the world. In order to prevent global warming and ensuing disasters, already Internet-service providers, hosting providers on green power have changed. Even household energy suppliers offer green electricity from renewable energy such as wind , solar, biomass and hydro, which emits no carbon dioxide, to stand against global warming. Only a global change for the information technology can prevent the global -warming. The switch to renewable energy is the beginning of our future and must be pursued as well as the research and development in information and communic…

Computer sciencebusiness.industryGlobal warmingInformation technologyGlobal changeEnergy consumptionEnvironmental economicsComputer securitycomputer.software_genreRenewable energyInformation and Communications TechnologyServerPosition (finance)businesscomputerInternational Journal of Computer Science and Information Technology
researchProduct

Low-cost active cyber defence

2014

The authors of this paper investigated relatively simple active strategies against selected popular cyber threat vectors. When cyber attacks are analysed for their severity and occurrence, many incidents are usually classifi ed as minor, e.g. spam or phishing. We are interested in the various types of low-end cyber incidents (as opposed to high-end state- sponsored incidents and advanced persistent threats) for two reasons: • being the least complicated incidents, we expect to fi nd simple active response The authors analysed the proposed strategies from the security economics point of view to determine why and how these strategies might be effective. We also discuss the legal aspects of th…

Computer sciencebusiness.industryInternet privacybusinessComputer securitycomputer.software_genrePhishingcomputerCyber threats2014 6th International Conference On Cyber Conflict (CyCon 2014)
researchProduct

UbiRoad: Semantic Middleware for Context-Aware Smart Road Environments

2010

A smart road environment is such a traffic environment that is equipped with all necessary facilities to enable seamless mobile service provisioning to the users. However, advanced sensors and network architectures deployed within the traffic environment are insufficient to make mobile service provisioning autonomous and proactive, thus minimizing drivers’ distraction during their presence in the environment. For that, an Intelligent Transportation System, which is operating on top of numerous sensor and access networks and governing the process of mobile services provisioning to the users in self-managed and proactive way, must be deployed. Specifically, such system should provide solution…

Computer sciencebusiness.industryInteroperabilityProvisioningComputer securitycomputer.software_genreAdvanced Traffic Management SystemInteroperationIntelligent NetworkMiddleware (distributed applications)Semantic technologybusinesscomputerMobile serviceComputer network2010 Fifth International Conference on Internet and Web Applications and Services
researchProduct

Adoption of Constrained Application Protocol

2016

Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodologica…

Computer sciencebusiness.industryPerspective (graphical)Techno economic020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreConstrained Application ProtocolWeb of ThingsRisk analysis (engineering)Software deployment0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe InternetLiterature surveybusinesscomputerProtocol (object-oriented programming)International Journal of Innovation in the Digital Economy
researchProduct

Keynote talk 3: From basics to advanced modelling and simulation techniques for mobile radio channels

2011

From the earliest beginnings of mobile communications to the present time, there has always been a high demand for realistic mobile radio channel models. This demand is driven by the fact that channel models are indispensable for the performance evaluation, parameter optimisation, and test of mobile communication systems. Channel modelling and simulation techniques are therefore of great importance for electronics and telecommunication engineers who are involved in the development of present and future mobile communication systems. This presentation will start with a review of the basic principles of mobile radio channel modelling and gradually moves to more advanced modelling and simulatio…

Computer sciencebusiness.industryPrincipal (computer security)Emphasis (telecommunications)Electrical engineeringlaw.inventionOpen researchRelaylawElectronic engineeringMobile telephonyElectronicsbusinessComputer Science::Information TheoryCommunication channelEnvelope (motion)The 2011 International Conference on Advanced Technologies for Communications (ATC 2011)
researchProduct

MEDiSN

2008

Staff shortages and an increasingly aging population are straining the ability of emergency departments to provide high-quality care. Moreover, there is a growing concern about the ability of hospitals to provide effective care during disaster events. Tools that automate patient monitoring would greatly improve efficiency, quality of care, and the volume of patients treated. Towards this goal, we have developed MEDiSN, a wireless sensor network for monitoring patients' vital signs in hospitals and disaster events. MEDiSN consists of Patient Monitors which are custom-built, patient-worn motes that sample, compress and secure medical data, and Relay Points that form a static multi-hop wireles…

Computer sciencebusiness.industryRemote patient monitoringQuality of serviceVital signsVolume (computing)Sample (statistics)Computer securitycomputer.software_genreWirelessbusinesscomputerCollection Tree ProtocolWireless sensor networkProceedings of the 6th ACM conference on Embedded network sensor systems
researchProduct

Evaluation of Ensemble Machine Learning Methods in Mobile Threat Detection

2017

The rapid growing trend of mobile devices continues to soar causing massive increase in cyber security threats. Most pervasive threats include ransom-ware, banking malware, premium SMS fraud. The solitary hackers use tailored techniques to avoid detection by the traditional antivirus. The emerging need is to detect these threats by any flow-based network solution. Therefore, we propose and evaluate a network based model which uses ensemble Machine Learning (ML) methods in order to identify the mobile threats, by analyzing the network flows of the malware communication. The ensemble ML methods not only protect over-fitting of the model but also cope with the issues related to the changing be…

Computer scienceintrusion detection0211 other engineering and technologiesDecision tree02 engineering and technologycomputer.software_genreComputer securitymobiililaitteet0202 electrical engineering electronic engineering information engineeringsupervised machine learningSoarAndroid (operating system)tietoturvata113021110 strategic defence & security studiesta213business.industrymobile threatsensemble methods020206 networking & telecommunicationsFlow networkEnsemble learninganomaly detectionmachine learningkoneoppiminenMalwareThe InternetbusinesscomputerMobile device
researchProduct

Behavioural Issues in Cybersecurity

2020

Computer securitycomputer.software_genrecomputer
researchProduct

Multiobjective optimization and decision making in engineering sciences

2021

AbstractReal-world decision making problems in various fields including engineering sciences are becoming ever more challenging to address. The consideration of various competing criteria related to, for example, business, technical, workforce, safety and environmental aspects increases the complexity of decision making and leads to problems that feature multiple competing criteria. A key challenge in such problems is the identification of the most preferred trade-off solution(s) with respect to the competing criteria. Therefore, the effective combination of data, skills, and advanced engineering and management technologies is becoming a key asset to a company urging the need to rethink how…

Control and OptimizationEvolutionary multiobjective optimizationComputer scienceAerospace EngineeringpäätöksentukijärjestelmätAsset (computer security)Multi-objective optimizationData scienceoptimointidatatiedeFeature (machine learning)Electrical and Electronic EngineeringCivil and Structural EngineeringExpensive optimizationManagement scienceIntersection (set theory)Mechanical EngineeringEngineering sciencesmonitavoiteoptimointiMultiple criteria decision makingFinancial engineeringIdentification (information)WorkforceKey (cryptography)tekniset tieteetSoftwareOptimization and Engineering
researchProduct

PLC security and critical infrastructure protection

2013

Programmable Logic Controllers (PLCs) are the most important components embedded in Industrial Control Systems (ICSs). ICSs have achieved highest standards in terms of efficiency and performance. As a result of that, higher portion of infrastructure in industries has been automated for the comfort of human beings. Therefore, protection of such systems is crucial. It is important to investigate the vulnerabilities of ICSs in order to solve the threats and attacks against critical infrastructure to protect human lives and assets. PLC is the basic building block of an ICS. If PLCs are exploited, overall system will be exposed to the threat. Many believed that PLCs are secured devices due to it…

Control system securityEngineeringbusiness.industryProgrammable logic controllerCritical infrastructure protectionIndustrial control systemComputer securitycomputer.software_genreStuxnetCritical infrastructureData Protection Act 1998Isolation (database systems)businesscomputer2013 IEEE 8th International Conference on Industrial and Information Systems
researchProduct