Search results for "Security"

showing 10 items of 1693 documents

Prnu Pattern Alignment for Images and Videos Based on Scene Content

2019

This paper proposes a novel approach for registering the PRNU pattern between different camera acquisition modes by relying on the imaged scene content. First, images are aligned by establishing correspondences between local descriptors: The result can then optionally be refined by maximizing the PRNU correlation. Comparative evaluations show that this approach outperforms those based on brute-force and particle swarm optimization in terms of reliability, accuracy and speed. The proposed scene-based approach for PRNU pattern alignment is suitable for video source identification in multimedia forensics applications.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle Informazioni021110 strategic defence & security studiesSettore INF/01 - Informaticabusiness.industryComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION0211 other engineering and technologiesPRNU SIFT image registration video stabilizationParticle swarm optimization02 engineering and technologyVideos Particle swarm optimization Image resolution Correlation Reliability Cameras SensorsIdentification (information)Content (measure theory)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionArtificial intelligencebusinessReliability (statistics)
researchProduct

Twitter Analysis for Real-Time Malware Discovery

2017

In recent years, the increasing number of cyber-attacks has gained the development of innovative tools to quickly detect new threats. A recent approach to this problem is to analyze the content of Social Networks to discover the rising of new malicious software. Twitter is a popular social network which allows millions of users to share their opinions on what happens all over the world. The subscribers can insert messages, called tweet, that are usually related to international news. In this work, we present a system for real-time malware alerting using a set of tweets captured through the Twitter API’s, and analyzed by means of a Bayes naïve classifier. Then, groups of tweets discussing th…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle Informazioni021110 strategic defence & security studiesSocial networkSocial SensingComputer sciencebusiness.industry0211 other engineering and technologies02 engineering and technologycomputer.software_genreMalware AlertsSocial Sensing; Twitter Analysis; Malware AlertsWorld Wide WebBayes' theoremTwitter Analysi0202 electrical engineering electronic engineering information engineeringMalware020201 artificial intelligence & image processingbusinesscomputerClassifier (UML)
researchProduct

Smart Auctions for Autonomic Ambient Intelligence Systems

2020

The main goal of Ambient Intelligence (AmI) is to support users in their daily activities by satisfying and anticipating their needs. To achieve such goal, AmI systems rely on physical infrastructures made of heterogenous sensing devices which interact in order to exchange information and perform monitoring tasks. In such a scenario, a full achievement of AmI vision would also require the capability of the system to autonomously check the status of the infrastructure and supervise its maintenance. To this aim, in this paper, we extend some previous works in order to allow the self-management of AmI devices enabling them to directly interact with maintenance service providers. In particular,…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAmbient intelligenceAmbient IntelligenceComputer sciencebusiness.industryMulti-agent systemSmart Contracts.020206 networking & telecommunications02 engineering and technologyTrusted ComputingService providerTrusted third partyComputer securitycomputer.software_genreMaintenance engineeringHome automation0202 electrical engineering electronic engineering information engineeringCommon value auction020201 artificial intelligence & image processingbusinesscomputer2020 IEEE International Conference on Smart Computing (SMARTCOMP)
researchProduct

Fingerprint Traits and RSA Algorithm Fusion Technique

2012

The present work deals with modern computing systems security issues, focusing on biometric based asymmetric keys generation process. Conventional PKI systems are based on private/public keys generated through RSA or similar algorithms. The present solution embeds biometric information on the private/public keys generation process. In addition the corresponding private key depends on physical or behavioural biometric features and it can be generated when it is needed. Starting from fingerprint acquisition, the biometric identifier is extracted, cyphered, and stored in tamper-resistant smart card to overcome the security problems of centralized databases. Biometric information is then used f…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAuthenticationBiometricsbusiness.industryComputer scienceData_MISCELLANEOUSPublic key infrastructureFingerprint recognitionComputer securitycomputer.software_genreEncryptionPublic-key cryptographyIdentifierFingerprint biometric and encryption algorithm fusion asymetric encryption tecniqueSmart cardbusinessAlgorithmcomputer
researchProduct

A Novel Recruitment Policy to Defend against Sybils in Vehicular Crowdsourcing

2021

Vehicular Social Networks (VSNs) is an emerging communication paradigm, derived by merging the concepts of Online Social Networks (OSNs) and Vehicular Ad-hoc Networks (VANETs). Due to the lack of robust authentication mechanisms, social-based vehicular applications are vulnerable to numerous attacks including the generation of sybil entities in the networks. We address this important issue in vehicular crowdsourcing campaigns where sybils are usually employed to increase their influence and worsen the functioning of the system. In particular, we propose a novel User Recruitment Policy (URP) that, after extracting the participants within the event radius of a crowdsourcing campaign, detects …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAuthenticationEvent (computing)business.industryComputer sciencecomputer.internet_protocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSCrowdsourcingComputer securitycomputer.software_genreDomain (software engineering)Random forestCrowdsourcing; Proximity Graph; Sybil detection; Trust and Truthfulness; Vehicular Social NetworkCrowdsourcing Proximity Graph Sybil detection Trust and Truthfulness Vehicular Social NetworkGraph (abstract data type)RADIUSbusinesscomputer
researchProduct

SecureBallot: A secure open source e-Voting system

2021

Abstract Voting is one of the most important acts through which a community can make a collective decision. In recent years, many works have focused on improving traditional voting mechanisms and, as a result, a wide range of electronic voting (e-Voting) systems have been proposed. Even though some approaches have achieved a proper level of usability, the main challenges of e-Voting are essentially still open: protect the privacy of participants, guarantee secrecy, anonymity, integrity, uniqueness, and authenticity of votes, while making e-Voting as trustful as voting. In order to address this issue, we present SecureBallot, a secure open-source e-Voting system that completely decouples the…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer Networks and Communicationsbusiness.industryComputer scienceElectronic votingmedia_common.quotation_subjectComputingMilieux_LEGALASPECTSOFCOMPUTINGUsabilityCryptographyComputer securitycomputer.software_genreData Security e-Voting PrivacyComputer Science ApplicationsIdentification (information)Hardware and ArchitectureVotingSecrecybusinessFormal verificationcomputerAnonymitymedia_commonJournal of Network and Computer Applications
researchProduct

Multi-Platform Agent Systems with Dynamic Reputation Policy Management

2011

Open, distributed multi-platform agent systems require new management approaches for resources and data secure access. In this paper a Jade-S based multi-platform agent system implementing dynamic reputation policy management is proposed. The implemented extension deals with biometrics, X-Security, DES cryptography and agent reputation. With more details, the proposed reputation management system helps to assess the agent's behavior and reliability, in order to select trusted agents. This is made possible by the knowledge that agents are able to acquire, over time, and that allows them to choose the best solution using own intelligence in total autonomy.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer sciencebusiness.industrymedia_common.quotation_subjectReliability (computer networking)JADE (programming language)CryptographyComputer securitycomputer.software_genreComputingMethodologies_ARTIFICIALINTELLIGENCEOrder (exchange)businesscomputerMulti platformAutonomycomputer.programming_languagemedia_commonReputationMulti-agents system security levels dynamic reputation management.
researchProduct

A Simulation Framework for Evaluating Distributed Reputation Management Systems

2016

In distributed environments, where interactions involve unknown entities, intelligent techniques for estimating agents’ reputation are required. Reputation Management Systems (RMSs) aim to detect malicious behaviors that may affect the integrity of the virtual community. However, these systems are highly dependent of the application domain they address; hence the evaluation of different RMSs in terms of correctness and resistance to security attacks is frequently a tricky task. In this work we present a simulation framework to support researchers in the assessment of a RMS. The simulator is organized in two logic layers where network nodes are mapped to system processes that implement the i…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniCorrectnessComputer scienceDistributed computingmedia_common.quotation_subjectComputer Science (all)Message Passing InterfaceSimulation framework020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreTask (project management)Distributed reputation managementControl and Systems EngineeringApplication domain020204 information systemsSynchronization (computer science)0202 electrical engineering electronic engineering information engineeringMultiagent systemcomputerReputation managementVirtual communityReputationmedia_common
researchProduct

Secure e-voting in smart communities

2020

Nowadays, digital voting systems are growing in importance. This is an especially sensitive area, because elections can directly affect democratic life of many smart communities. The goal of digital voting systems is to exploit ICT technologies to improve the security and usability of traditional electoral systems. In this work we present a secure electronic voting system that guarantees the secrecy, anonymity, integrity, uniqueness and authenticity of votes, while offering a user-friendly experience to voters, putting them at ease through the use of technologies familiar to them. To ensure these fundamental security requirements, the system fully separates the registration and voting phase…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniData Securitye-VotingSmart Communitie
researchProduct

Reputation management in distributed systems

2008

Several distributed applications, implemented over today’s Internet, are based on the assumption that participating agents collaborate in order to achieve their own goal. However, when these applications are modelled as unstructured distributed systems, the greater autonomy and decentralization encourage antisocial behaviours, which are likely to cause performance degradation for the whole system. This paper presents a fully distributed reputation management system that allows the evaluation of agent reputation in unstructured environments without any centralized coordination. The proposed approach is based on game theory and is capable of capturing the highly dynamic nature of the involved…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniExploitbusiness.industryComputer scienceDistributed computingmedia_common.quotation_subjectComputer securitycomputer.software_genreDecentralizationFree ridingDistributed SystemIncentiveOrder (exchange)The InternetbusinessGame theorycomputerReputationReputationmedia_common2008 3rd International Symposium on Communications, Control and Signal Processing
researchProduct