Search results for "Computer security"

showing 10 items of 433 documents

Blockchain based Device identification and authentication in a Smart Grid

2020

The power grid is a critical infrastructure of a country that needs protection and security. According to the report of the International Energy Agency, the electricity demand is constantly increasing the world over. Countries are moving towards green energy and efforts are being made to integrate these green energy into the main grid. Smart Grid will improve the reliability and efficiency of the grid by managing the energy demand. Cyber-attacks and cyber terrorism is also increasingly targeting the electrical grid. Intruders may try to gain access to the grid by exploiting the vulnerability of the grid. IEDs/devices are the endpoints of the network and they are the weakest link in the enti…

AuthenticationIdentification (information)Smart gridComputer scienceCryptographic hash functionComputer securitycomputer.software_genreGridElectrical gridcomputerCritical infrastructureVulnerability (computing)2020 5th International Conference on Smart and Sustainable Technologies (SpliTech)
researchProduct

Privacy enhanced mutual authentication in LTE

2013

In this paper we propose a way to enhance the identity privacy in LTE/LTE-Advanced systems. This is achieved while minimizing the impact on the existing E-UTRAN system. This is important since proposals to modify a widely deployed infrastructure must be cost effective, both in terms of design changes and in terms of deployment cost. In our proposal, the user equipment (UE) identifies itself with a dummy identity, consisting only of the mobile nation code and the mobile network code. We use the existing signalling mechanisms in a novel way to request a special encrypted identity information element. This element is protected using identity-based encryption (IBE), with the home network (HPLMN…

AuthenticationInformation privacybusiness.industryComputer scienceMutual authenticationEncryptionComputer securitycomputer.software_genrePublic-key cryptographyIdentifierUser equipmentMessage authentication codebusinesscomputerComputer network2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
researchProduct

A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users

2003

Currently used in mobile devices PIN-based user authentication cannot provide a sufficient security level. Methods based on multi-modal user authentication involving biometrics (i.e. physical and behavioral characteristics of a person) may be employed to cope with this problem. However, dealing with physical characteristics only, these methods are either unable to provide continuous and user-friendly identity verification, or are resource consuming.

AuthenticationUser authenticationResource (project management)BiometricsHuman–computer interactionComputer scienceIdentity (object-oriented programming)Security levelComputer securitycomputer.software_genreMobile devicecomputer
researchProduct

Using continuous user authentication to detect masqueraders

2003

Nowadays computer and network intrusions have become more common and more complicated, challenging the intrusion detection systems. Also, network traffic has been constantly increasing. As a consequence, the amount of data to be processed by an intrusion detection system has been growing, making it difficult to efficiently detect intrusions online. Proposes an approach for continuous user authentication based on the user’s behaviour, aiming at development of an efficient and portable anomaly intrusion detection system. A prototype of a host‐based intrusion detection system was built. It detects masqueraders by comparing the current user behaviour with his/her stored behavioural model. The m…

AuthenticationUser profileComputer scienceAnomaly-based intrusion detection systemReal-time computingIntrusion detection systemLibrary and Information SciencesManagement Science and Operations ResearchComputer securitycomputer.software_genreManagement Information SystemsInformation protection policyHost-based intrusion detection systemSystems architectureBusiness and International ManagementHost (network)computerInformation Management & Computer Security
researchProduct

A distributed detection and prevention scheme from malicious nodes in vehicular networks

2016

Summary Vehicular environments still remain vulnerable to various potential attacks because of continuous interactions and information exchange between vehicles despite the deployment of authentication techniques by communication standards. Therefore, an authenticated node with a certificate could initiate an attack while complying with implemented protocols. Some mechanisms were proposed to enhance communication technologies, but none of them was able to anticipate nodes' behavior. They also mismanage oscillating vehicles, because they evict them automatically after misbehaving. In this paper, we propose a preventive mechanism, namely, Intrusion Prevention and Detection System (IPDS), able…

AuthenticationVehicular ad hoc networkComputer Networks and CommunicationsComputer sciencebusiness.industryNode (networking)020206 networking & telecommunications02 engineering and technologyKalman filterCertificateComputer securitycomputer.software_genreSoftware deployment0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingElectrical and Electronic EngineeringRouting (electronic design automation)businesscomputerInformation exchangeComputer networkInternational Journal of Communication Systems
researchProduct

Factorial structure of recklessness: To what extent are older drivers different?

2003

This study tests whether the original factorial structure of a recklessness questionnaire can be maintained for the current Spanish population of older drivers.Our recent interest in dedicating special attention to senior citizen mobility (Monterde, 2001), is due to the impending increase of the aging population in Western countries; this has led us to reinitiate the psychometric study of the construct validity, revising and including older drivers in the psychometric aspects of those evaluation instruments that will then be used in the Spanish psycho-medical check of drivers and in research.Factorial analysis was used to determine validity.There was an appearance of a different psychologic…

Automobile DrivingEngineeringPopulation ageingPsychometricsApplied psychologyPoison controlAffect (psychology)Computer securitycomputer.software_genreTraffic psychologySurveys and QuestionnairesInjury preventionHumansPsychological testingSafety Risk Reliability and QualityAgedbusiness.industryAccidents TrafficAge FactorsConstruct validityAttitudeGeriatricsSafetyRecklessnessbusinessRisk Reduction BehaviorcomputerJournal of Safety Research
researchProduct

The eio proposal for a directive and mafia trials: Striving for balance between efficiency and procedural guarantees

2013

PD EIO could mark a turning point in the development of “European criminal procedure.” The Proposal will obtain evidence in cross-border cases and is particularly suitable for investigations on the subject of international organized crime. From the long gestation period and the contents of the Proposal emerges, however, the difficulty of making a balance between the investigation of crimes and the guarantees of the individuals involved. The use of collected of evidence from different legal systems is often an overly neglected aspect. Doubt surrounds the regulation of banking instruments, the rules on wiretapping, and all provisions for undercover investigations.

BalancePD EIOSubject (philosophy)EfficiencyDirectiveComputer securitycomputer.software_genreMafia caseBalance (accounting)Efficiency Procedural guarantees BalancesSettore IUS/16 - Diritto Processuale PenaleTurning pointOrganised crimeBusinesscomputerProcedural guaranteeLaw and economics
researchProduct

Q-Chem 2.0: a high-performanceab initio electronic structure program package

2000

ABSTRACT: Q-Chem 2.0 is a new release of an electronic structure programpackage, capable of performing first principles calculations on the ground andexcited states of molecules using both density functional theory and wavefunction-based methods. A review of the technical features contained withinQ-Chem 2.0 is presented. This article contains brief descriptive discussions of thekey physical features of all new algorithms and theoretical models, together withsample calculations that illustrate their performance. c 2000 John Wiley S electronic structure; density functional theory;computer program; computational chemistry Introduction A reader glancing casually at this article mightsuspect on t…

Basis (linear algebra)Computer programProgramming languageComputer sciencePrincipal (computer security)Theoretical modelsAb initioGeneral ChemistryElectronic structurecomputer.software_genreComputational scienceComputational MathematicsKey (cryptography)Density functional theorycomputerJournal of Computational Chemistry
researchProduct

Tracing battery usage for second life market with a blockchain-based framework

2021

This work describes the design of a platform based on a permissioned blockchain for sharing relevant information among the actors involved in grid service provision programs. The information collected by a proprietary monitoring on-board system accessing the central unit of the Electric Vehicle, EV, is then sent to a dropbox folder owned by the car owner and then written on a blockchain platform. The platform could be supplied from similar data from the grid operator collected on the grid during the provision of services. In this way data can be validated and used for tracing the health status of the EV's battery. The design of customized smart contract allows to acquire the profiles of bat…

Battery (electricity)business.product_categorySmart contractComputer scienceVehicle-to-gridTracingComputer securitycomputer.software_genreGridWork (electrical)Electric vehiclebusinesscomputerCommunication channel2021 IEEE International Conference on Environment and Electrical Engineering and 2021 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe)
researchProduct

Offshore Assets in the Transition from ‘Traditional Business Practice’ to ‘Connected Business Eco-systems’

2020

In many industrial sectors we have already begun to see how new business ecosystems gradually emerge turning the traditional business practices upside down. Particularly within relatively conventional sectors, such as upstream oil and gas (O&G) and land-based process industry, we expect to see substantial changes in the years to come. In this paper, we elaborate on principal challenges related to major structural changes and core technology platforms for the oil industry identifying critical features and elaborating on emerging operational principles. This is based on a critical review of latest industry conditions and practices that are targeted towards the creation of new business models …

Business practicePetroleum industrybusiness.industryTransition (fiction)Principal (computer security)Submarine pipelineBusinessBusiness modelIntegrated operationsBusiness ecosystemIndustrial organization
researchProduct