Search results for "Computer security"

showing 10 items of 433 documents

DeCyMo: Decentralized Cyber-physical System for Monitoring and Controlling Industries and Homes

2018

The recent revolution of the Internet of Things has given the birth of a series of new technologies and cyber-physical systems to be used in industrial and home scenarios. Cyber- physical systems include physical and software components for providing smart monitoring and control with flexibility and adaptability to the operating context. The IoT paradigm enables the intertwined use of physical and software components through the interconnection of devices that exchange data with each other without direct human interaction in several fields, especially in industrial and home environments. We propose DeCyMo, a decentralized architecture that aims at solving common IoT issues and vulnerabiliti…

Flexibility (engineering)Emerging technologiesComputer scienceSettore ING-INF/03 - Telecomunicazionimedia_common.quotation_subjectCyber-physical systemContext (language use)Computer securitycomputer.software_genreExtensibilityAdaptabilityComponent-based software engineeringArchitecturecomputercyber-physical system blockchain IoT data streammedia_common
researchProduct

The future use of structural composite materials in the automotive industry

2007

The automotive industry's use of structural composite materials began in the 1950s. Since those early days, it has been demonstrated that composites are lightweight, fatigue resistant and easily moulded to shape in other words, a seemingly attractive alternative to metals. However, there has been no widespread switch from metals to composites in the automotive sector. This is because there are a number of technical issues relating to the use of composite materials that still need to be resolved including accurate material characterisation, manufacturing and joining. This paper reports the findings of a recent European initiative that examined the future use of composite materials in the aut…

Flexibility (engineering)EngineeringTest proceduresbusiness.industryMechanical EngineeringAutomotive EngineeringComposite numberPrincipal (computer security)Automotive industryComposite materialbusinessManufacturing engineeringInternational Journal of Vehicle Design
researchProduct

Blockchain for Smart Cities: Applications for IoT and Video Surveillance Systems

2020

The recent revolution of the Internet of Things introduces new engaging operat- ing scenarios. The IoT paradigm enables the intertwined use of physical and soft- ware components through the interconnection of devices that exchange data with each other without direct human interaction in several fields, especially in industrial and home environments. In the framework of the Italian-Vietnamese cooperation on the topics of smart cities and Blockchain, we present two applications of the blockchain technology, which can be applied, respectively in indoor, for monitoring and controlling smart homes, and in outdoor, for visual monitoring through video surveillance systems. In both cases, we propos…

Flexibility (engineering)ImmutabilityFocus (computing)BlockchainSettore ING-INF/03 - TelecomunicazioniComputer sciencebusiness.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONVideosurveillance IoT blockchainComputer securitycomputer.software_genreExtensibilityComponent-based software engineeringTimestampInternet of Thingsbusinesscomputer
researchProduct

Lightweight Privacy-aware yet Accountable Secure Scheme for SM-SGCC communications in smart grid

2011

Abstract Smart grid is envisioned as a critical application of cyber-physical systems and of the internet of things. In the smart grid, smart meters equipped with wireless sensors can upload meter readings (data) to smart grid control and schedule centers via the advanced metering infrastructure to improve power delivery efficiency. However, data gathered in short intervals, such as 15 minutes, will expose customers' detailed daily activities (for example, when they get up and when they use oven) using nonintrusive appliance load monitoring. Thus, data must be hidden to protect customers' privacy. However, data accountability is still required for emergency responses or to trace back suspec…

Flexibility (engineering)ScheduleSecurity analysisEngineeringMultidisciplinarybusiness.industryCryptographic protocolComputer securitycomputer.software_genreUploadSmart gridScalabilityWirelessbusinesscomputerTsinghua Science and Technology
researchProduct

Cloud Computing Vulnerabilities Analysis

2019

Nowadays cloud computing technologies are the most widely used tools due to their great flexibility and also to their lower maintenance costs. Many vendors of cloud computing have appeared on the market for each type of cloud. These solutions still pose certain vulnerabilities and work to improve the security of cloud computing technologies. We analyze the main cloud computing solutions, analyze the vulnerabilities identified for these solutions, and also calculate the impact of these vulnerabilities based on the NVD scores. We average the scores for each solution for each cloud computing model. This way, we can see the impact of the vulnerabilities identified so far for each cloud computin…

Flexibility (engineering)business.industryComputer scienceVulnerability020206 networking & telecommunicationsCloud computing02 engineering and technologyComputer securitycomputer.software_genreCVSS0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinesscomputerProceedings of the 2019 4th International Conference on Cloud Computing and Internet of Things
researchProduct

SMS disaster alert system programming

2008

Floods are natural phenomena that profoundly affect the development of human society, as they are the most widespread disasters in the world and they cause the greatest property and human loss. The flood warning system presented in this paper provides a reliable and effective solution, which is complementary to existing traditional warning systems; it employs information and communication technology and specialized devices.

Flood warningWarning systemInformation and Communications TechnologyComputer scienceElectronic messagingServerComputer securitycomputer.software_genrecomputerHuman societyAlert systemEffective solution2008 2nd IEEE International Conference on Digital Ecosystems and Technologies
researchProduct

Recent Advances in Security and Privacy for Future Intelligent Networks

2020

The articles in this special section focus on recent advances in security and privacy for future intelligent networks. Recent booming advancements in networking techniques have led to an evolution toward future intelligent networks (FINs). This trend takes place under a circumstance in which a great number of devices are connected for specific purposes by a variety of novel techniques. In FINs, we envision the benefits of integrating intelligence into networks. Contemporarily, these emerging techniques are still at the exploration stage, leaving many privacy and security challenges unaddressed. Existing researchers have already uncovered a great amount of attacks and threats. The situation …

Focus (computing)Intelligent NetworkComputer Networks and CommunicationsHardware and ArchitectureComputer scienceSpecial sectionComputer securitycomputer.software_genrecomputerSoftwareInformation SystemsVariety (cybernetics)IEEE Network
researchProduct

“Vendor-Affected” WLAN experimental results: A Pandora’s Box?

2008

Experimental results are typically envisioned as the ultimate validation reference for any theoretical and/or simulation modelling assumptions. However, in the case of Wireless LANs, the situation is not nearly as straightforward as it might seem. In this paper, we discuss to what (large) extent measurement results may depend on proprietary undocumented algorithms implemented in the vendor-specific card/driver employed. Specifically, we focus on the experimental study of IEEE 802.11 b/g outdoor links based on the widely used Atheros/MADWiFi card/driver pair. We show that unexpected performance divergences do emerge in two classes of comparative experiments run on a same outdoor link: broadc…

Focus (computing)S-boxComputer sciencebusiness.industryVendorBroadcastingComputer securitycomputer.software_genrePreamblePHYWireless lanUnicastbusinesscomputerMultipath propagationComputer network2008 International Conference on Telecommunications
researchProduct

Survey: Intrusion Detection Systems in Encrypted Traffic

2016

Intrusion detection system, IDS, traditionally inspects the payload information of packets. This approach is not valid in encrypted traffic as the payload information is not available. There are two approaches, with different detection capabilities, to overcome the challenges of encryption: traffic decryption or traffic analysis. This paper presents a comprehensive survey of the research related to the IDSs in encrypted traffic. The focus is on traffic analysis, which does not need traffic decryption. One of the major limitations of the surveyed researches is that most of them are concentrating in detecting the same limited type of attacks, such as brute force or scanning attacks. Both the …

Focus (computing)Traffic analysisNetwork packetComputer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciencesPayload (computing)020206 networking & telecommunications02 engineering and technologyIntrusion detection systemComputer securitycomputer.software_genreEncryptionSet (abstract data type)Brute force0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencesbusinesscomputer050104 developmental & child psychology
researchProduct

Fostering Learning and Sustained Improvement: The Influence of Principalship

2009

This article reports on selected findings from the project ‘Revisiting Successful Principals’. The authors revisited some of the schools which participated in the International Successful School Principalship Project (ISSPP) five years ago. In this article they focus on how the principals are positioning themselves as leaders, and how they are involved in the construction of a public self, while responding to questions about fostering learning and sustained improvement. The study confirms that a principal may have a significant influence on a school's policy and in particular the preferred strategies. In addition, the study revealed that, despite the new expectations which are raised towar…

Focus (computing)business.industryPrincipal (computer security)Public relationsPsychologybusinessEducationManagementEuropean Educational Research Journal
researchProduct