Search results for "Computer security"
showing 10 items of 433 documents
DeCyMo: Decentralized Cyber-physical System for Monitoring and Controlling Industries and Homes
2018
The recent revolution of the Internet of Things has given the birth of a series of new technologies and cyber-physical systems to be used in industrial and home scenarios. Cyber- physical systems include physical and software components for providing smart monitoring and control with flexibility and adaptability to the operating context. The IoT paradigm enables the intertwined use of physical and software components through the interconnection of devices that exchange data with each other without direct human interaction in several fields, especially in industrial and home environments. We propose DeCyMo, a decentralized architecture that aims at solving common IoT issues and vulnerabiliti…
The future use of structural composite materials in the automotive industry
2007
The automotive industry's use of structural composite materials began in the 1950s. Since those early days, it has been demonstrated that composites are lightweight, fatigue resistant and easily moulded to shape in other words, a seemingly attractive alternative to metals. However, there has been no widespread switch from metals to composites in the automotive sector. This is because there are a number of technical issues relating to the use of composite materials that still need to be resolved including accurate material characterisation, manufacturing and joining. This paper reports the findings of a recent European initiative that examined the future use of composite materials in the aut…
Blockchain for Smart Cities: Applications for IoT and Video Surveillance Systems
2020
The recent revolution of the Internet of Things introduces new engaging operat- ing scenarios. The IoT paradigm enables the intertwined use of physical and soft- ware components through the interconnection of devices that exchange data with each other without direct human interaction in several fields, especially in industrial and home environments. In the framework of the Italian-Vietnamese cooperation on the topics of smart cities and Blockchain, we present two applications of the blockchain technology, which can be applied, respectively in indoor, for monitoring and controlling smart homes, and in outdoor, for visual monitoring through video surveillance systems. In both cases, we propos…
Lightweight Privacy-aware yet Accountable Secure Scheme for SM-SGCC communications in smart grid
2011
Abstract Smart grid is envisioned as a critical application of cyber-physical systems and of the internet of things. In the smart grid, smart meters equipped with wireless sensors can upload meter readings (data) to smart grid control and schedule centers via the advanced metering infrastructure to improve power delivery efficiency. However, data gathered in short intervals, such as 15 minutes, will expose customers' detailed daily activities (for example, when they get up and when they use oven) using nonintrusive appliance load monitoring. Thus, data must be hidden to protect customers' privacy. However, data accountability is still required for emergency responses or to trace back suspec…
Cloud Computing Vulnerabilities Analysis
2019
Nowadays cloud computing technologies are the most widely used tools due to their great flexibility and also to their lower maintenance costs. Many vendors of cloud computing have appeared on the market for each type of cloud. These solutions still pose certain vulnerabilities and work to improve the security of cloud computing technologies. We analyze the main cloud computing solutions, analyze the vulnerabilities identified for these solutions, and also calculate the impact of these vulnerabilities based on the NVD scores. We average the scores for each solution for each cloud computing model. This way, we can see the impact of the vulnerabilities identified so far for each cloud computin…
SMS disaster alert system programming
2008
Floods are natural phenomena that profoundly affect the development of human society, as they are the most widespread disasters in the world and they cause the greatest property and human loss. The flood warning system presented in this paper provides a reliable and effective solution, which is complementary to existing traditional warning systems; it employs information and communication technology and specialized devices.
Recent Advances in Security and Privacy for Future Intelligent Networks
2020
The articles in this special section focus on recent advances in security and privacy for future intelligent networks. Recent booming advancements in networking techniques have led to an evolution toward future intelligent networks (FINs). This trend takes place under a circumstance in which a great number of devices are connected for specific purposes by a variety of novel techniques. In FINs, we envision the benefits of integrating intelligence into networks. Contemporarily, these emerging techniques are still at the exploration stage, leaving many privacy and security challenges unaddressed. Existing researchers have already uncovered a great amount of attacks and threats. The situation …
“Vendor-Affected” WLAN experimental results: A Pandora’s Box?
2008
Experimental results are typically envisioned as the ultimate validation reference for any theoretical and/or simulation modelling assumptions. However, in the case of Wireless LANs, the situation is not nearly as straightforward as it might seem. In this paper, we discuss to what (large) extent measurement results may depend on proprietary undocumented algorithms implemented in the vendor-specific card/driver employed. Specifically, we focus on the experimental study of IEEE 802.11 b/g outdoor links based on the widely used Atheros/MADWiFi card/driver pair. We show that unexpected performance divergences do emerge in two classes of comparative experiments run on a same outdoor link: broadc…
Survey: Intrusion Detection Systems in Encrypted Traffic
2016
Intrusion detection system, IDS, traditionally inspects the payload information of packets. This approach is not valid in encrypted traffic as the payload information is not available. There are two approaches, with different detection capabilities, to overcome the challenges of encryption: traffic decryption or traffic analysis. This paper presents a comprehensive survey of the research related to the IDSs in encrypted traffic. The focus is on traffic analysis, which does not need traffic decryption. One of the major limitations of the surveyed researches is that most of them are concentrating in detecting the same limited type of attacks, such as brute force or scanning attacks. Both the …
Fostering Learning and Sustained Improvement: The Influence of Principalship
2009
This article reports on selected findings from the project ‘Revisiting Successful Principals’. The authors revisited some of the schools which participated in the International Successful School Principalship Project (ISSPP) five years ago. In this article they focus on how the principals are positioning themselves as leaders, and how they are involved in the construction of a public self, while responding to questions about fostering learning and sustained improvement. The study confirms that a principal may have a significant influence on a school's policy and in particular the preferred strategies. In addition, the study revealed that, despite the new expectations which are raised towar…