Search results for "Computer security"
showing 10 items of 433 documents
Agent-Based Model to Study and Quantify the Evolution Dynamics of Android Malware Infection
2014
[EN] In the last years the number of malware Apps that the users download to their devices has risen. In this paper, we propose an agentbased model to quantify the Android malware infection evolution, modeling the behavior of the users and the different markets where the users may download Apps. The model predicts the number of infected smartphones depending on the type of malware. Additionally, we will estimate the cost that the users should afford when the malware is in their devices. We will be able to analyze which part is more critical: the users, giving indiscriminate permissions to the Apps or not protecting their devices with antivirus software, or the Android platform, due to the v…
Relative principal congruences in congruence-modular quasivarieties
1998
The problem of definability of relative principal congruences in relatively congruence modular (RCM) quasivarieties is investigated. The RCM quasivarieties are characterized in terms of parameterized families of finite sets of pairs of terms which define relative principal congruences.
Using ‘Ambient Intelligence’ for Compensating Intellectual Difficulties of People with Severe Learning Difficulties and/or Autistic Spectrum Disorders
2004
This paper describes a set of services and software created so that what is called ‘ambient intelligence’ would compensate for the ‘intellectual difficulties’ that people from this collective have. Existing concepts and standards of ambient intelligence are strongly reinforced through the use of the exact current user’s position as a key factor to calculate how the ‘digital home’ or any ‘digital environment’ behaves at every moment. This will be obtained using both Wi-Fi personal locators (embedded in necklaces or bracelets) and Wi-Fi communication from the PDA. This mix, together with individual capabilities and preferences, makes the development of a wide range of services possible when c…
The Studio: Reflections and Issues Arising
1999
An advanced Telematic Studio was built at the University of Jyvaskyla to combine the latest technologies for local and distributed work and/or meetings. The objectives were to combine leading edge technologies with ethnographic design principles derived from CSCW and HCI to support a broad range of activities. We informed the design by studies of similar facilities on other sites. The Studio is popular, and it is easy to give glowing accounts of its use. Nevertheless, over three years a significant number of problems have arisen with both technologies and uses. Some of these are local. Others may be generalisable to any ‘cooperative building’. For example: problems with videoconferencing; i…
AHBIM for Wooden Built Heritage Conservation
2019
The chapter investigates the potential offered by the Building Information Modeling for the conservation of the wooden architectural heritage. Based on the architectural survey, the BIM modeling of a South Tyrolean farm was carried out, with particular attention to the aspects related to its management and maintenance. Inside the database connected to the model, information about the building has been included, which can also be used on site through the use of mobile devices. The sharing of such information within a single platform avoids risks connected to the failure or incorrect transmission of data, allowing the optimization of the management, maintenance and conservation of the archite…
Artificial Intelligence for Cybersecurity: A Systematic Mapping of Literature
2020
Due to the ever-increasing complexities in cybercrimes, there is the need for cybersecurity methods to be more robust and intelligent. This will make defense mechanisms to be capable of making real-time decisions that can effectively respond to sophisticated attacks. To support this, both researchers and practitioners need to be familiar with current methods of ensuring cybersecurity (CyberSec). In particular, the use of artificial intelligence for combating cybercrimes. However, there is lack of summaries on artificial intelligent methods for combating cybercrimes. To address this knowledge gap, this study sampled 131 articles from two main scholarly databases (ACM digital library and IEEE…
A simulation of disagreement for control of rational cheating in peer review
2013
Understanding the peer review process could help research and shed light on the mechanisms that underlie crowdsourcing. In this paper, we present an agent-based model of peer review built on three entities - the paper, the scientist and the conference. The system is implemented on a BDI platform (Jason) that allows to define a rich model of scoring, evaluating and selecting papers for conferences. Then, we propose a programme committee update mechanism based on disagreement control that is able to remove reviewers applying a strategy aimed to prevent papers better than their own to be accepted (rational cheating). We analyze a homogeneous scenario, where all conferences aim to the same leve…
The security of mobile business applications based on mCRM
2020
A development of mobile technologies, and their common use in business, creates new challenges for people dealing with data security in the organization. This paper explores the types and nature of threats to the enterprise that result from the widespread use of business applications on smartphones (e.g. mobile CRM). The analysis has been focused on smartphones and tablets running on the Android operating system. We used STRIDE - a threat modeling technique commonly used to detect vulnerabilities in software security. We propose its modification to better design and implement solutions for the security of mobile devices. We also used the Data Flow Diagram and the Attack Tree concept to anal…
Analyzing the security of Windows 7 and Linux for cloud computing
2013
We review and analyze the major security features and concerns in deploying modern commodity operating systems such as Windows 7 and Linux 2.6.38 in a cloud computing environment. We identify the security weaknesses and open challenges of these two operating systems when deployed in the cloud environment. In particular, we examine and compare various operating system security features which are critical in providing a secure cloud. These security features include authentication, authorization and access control, physical memory protection, privacy and encryption of stored data, network access and firewalling capabilities, and virtual memory.
Disadvantaged by Disability: Examining the Accessibility of Cyber Security
2021
Today, we are living in a digitally dependent world. Through the use of digital technologies, life is meant to be easier and streamlined. This includes giving access to services that previously were unavailable to many due to disability. Although technology has evolved immensely over the past few decades, reducing the digital divide, authentication methods have changed very little. Authentication is the forefront of securing users’ information, services and technology, yet for many it still poses issues in terms of usability and security, due to specific characteristics of different disabilities. In this paper, drawing upon a literature review, a review of recognized disabilities, and the r…