Search results for "Security"

showing 10 items of 1693 documents

A Simulation Software for the Evaluation of Vulnerabilities in Reputation Management Systems

2019

Multi-agent distributed systems are characterized by autonomous entities that interact with each other to provide, and/or request, different kinds of services. In several contexts, especially when a reward is offered according to the quality of service, individual agents (or coordinated groups) may act in a selfish way. To prevent such behaviours, distributed Reputation Management Systems (RMSs) provide every agent with the capability of computing the reputation of the others according to direct past interactions, as well as indirect opinions reported by their neighbourhood. This last point introduces a weakness on gossiped information that makes RMSs vulnerable to malicious agents’ intent …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniGeneral Computer ScienceDistributed algorithmComputer scienceMulti-agent systemQuality of servicemedia_common.quotation_subjectNetwork simulation020206 networking & telecommunications02 engineering and technologycomputer.software_genreVariety (cybernetics)Simulation softwareDistributed systems security.Risk analysis (engineering)Software deploymentRobustness (computer science)020204 information systems0202 electrical engineering electronic engineering information engineeringDisseminationcomputerReputationmedia_common
researchProduct

A Novel Visual Interface to Foster Innovation in Mechanical Engineering and Protect from Patent Infringement

2018

One of the main time and money consuming tasks in the design of industrial devices and parts is the checking of possible patent infringements. Indeed, the great number of documents to be mined and the wide variety of technical language used to describe inventions are reasons why considerable amounts of time may be needed. On the other hand, the early detection of a possible patent conflict, in addition to reducing the risk of legal disputes, could stimulate a designers' creativity to overcome similarities in overlapping patents. For this reason, there are a lot of existing patent analysis systems, each with its own features and access modes. We have designed a visual interface providing an …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniHistoryVisual languageComputer sciencePatent infringement detection05 social sciencesPatent infringementComputingMilieux_LEGALASPECTSOFCOMPUTING02 engineering and technology050905 science studiesComputer securitycomputer.software_genreComputer Science ApplicationsEducationindustrial design.Semantic database0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingmechanical0509 other social sciencesVisual interfacecomputer
researchProduct

Secure random number generation in wireless sensor networks

2011

The increasing adoption of wireless sensor networks as a flexible and inexpensive tool for the most diverseapplications, ranging from environmental monitoring to home automation, has raised more and more atten-tion to the issues related to the design of specifically customized security mechanisms. The scarcity ofcomputational, storage, and bandwidth resources cannot definitely be disregarded in such context, and thismakes the implementation of security algorithms particularly challenging. This paper proposes a securityframework for the generation of true random numbers, which are paramount as the core building blockfor many security algorithms; the intrinsic nature of wireless sensor nodes …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniLeader electionleader election random numbers generation wireless sensor networksRandom number generationbusiness.industryComputer scienceDistributed computingKey distribution in wireless sensor networksTrue random numbers generatorRobustness (computer science)Mobile wireless sensor networknetwork securityWirelessbusinesswireless sensor networksWireless sensor networkRandomnessComputer Science::Cryptography and SecurityComputer network
researchProduct

SMCP: a Secure Mobile Crowdsensing Protocol for fog-based applications

2020

Abstract The possibility of performing complex data analysis through sets of cooperating personal smart devices has recently encouraged the definition of new distributed computing paradigms. The general idea behind these approaches is to move early analysis towards the edge of the network, while relying on other intermediate (fog) or remote (cloud) devices for computations of increasing complexity. Unfortunately, because both of their distributed nature and high degree of modularity, edge-fog-cloud computing systems are particularly prone to cyber security attacks that can be performed against every element of the infrastructure. In order to address this issue, in this paper we present SMCP…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniModularity (networks)General Computer ScienceExploitEdge devicebusiness.industryComputer scienceDistributed computingHuman Activity RecognitionCyber SecurityCloud computingCryptographic protocolEncryptionlcsh:Q350-390lcsh:QA75.5-76.95Artificial Intelligencelcsh:Information theoryMobile Crowdsensinglcsh:Electronic computers. Computer scienceEnhanced Data Rates for GSM EvolutionbusinessProtocol (object-oriented programming)
researchProduct

A TRNG Exploiting Multi-Source Physical Data

2010

In recent years, the considerable progress of miniaturization and the consequent increase of the efficiency of digital circuits has allowed a great diffusion of the wireless sensor network technology. This has led to the growth of applications and protocols for applying these networks to several scenarios, such as the military one, where it is essential to deploy security protocols in order to prevent opponents from accessing the information exchanged among sensor nodes. This paper analyzes security issues of data processed by the WSN and describes a system able to generate sequences of random numbers, which can be used by security algorithms and protocols. The proposed True Random Number G…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniRandom number generationbusiness.industryNetwork securityComputer scienceDistributed computingNode (networking)Cryptographic protocolTrusted third partyKey distribution in wireless sensor networksWireless Sensor Networks Random Number Generator Network SecurityNISTbusinessWireless sensor networkComputer network
researchProduct

Vulnerability evaluation of distributed reputation management systems

2017

In distributed environments, Reputation Management Systems (RMSs) aim to estimate agents' trustworthiness by exploiting different sources of information. The distributed nature of these systems makes them vulnerable to several types of security attacks, and the response provided by a specific RMS depends on various factors, such as the algorithms adopted for estimating the reputation values and the communication protocols used to enable the cooperation among agents. This work examines the most important security attacks against RMSs and proposes a set of metrics for a quantitative evaluation of the RMS vulnerabilities. A parallel simulation framework is used to automatically give a vulnerab…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSecurity attackComputer sciencemedia_common.quotation_subjectVulnerability020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreSet (abstract data type)Parallel simulationTrustworthinessDistributed reputation management020204 information systemsVulnerability evaluation0202 electrical engineering electronic engineering information engineeringData miningCommunications protocolcomputerInstrumentationReputation managementEvaluation metricReputationmedia_common
researchProduct

An extended JADE-S based framework for developing secure Multi-Agent Systems

2009

Agent communities are self-organized virtual spaces consisting of a large number of agents and their dynamic environments. Within a community, agents group together offering special e-services for effective, reliable, and mutual benefits. Usually, an agent community is composed of specialized agents performing one or more tasks in a single domain/sub-domain, or in highly intersecting domains. However, secure Multi- Agent Systems require severe mechanisms in order to prevent malicious attacks. Several limits affect exiting secure agents platform, such as the lack of a strong authentication system, the lack of a flexible distributed mechanism for access control and the lack of a system for st…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniService (systems architecture)AuthenticationPublic key certificateComputer sciencebusiness.industryMulti-agent systemmedia_common.quotation_subjectJADE (programming language)Access controlMulti-Agent Systems Security Biometric Authentication SystemsComputer securitycomputer.software_genreHardware and ArchitectureStrong authenticationbusinessLawcomputerSoftwareComputer networkReputationmedia_commoncomputer.programming_languageComputer Standards & Interfaces
researchProduct

Reputation Management for Distributed Service-Oriented Architectures

2010

Nowadays, several network applications require that consumer nodes acquire distributed services from unknown service providers on the Internet. The main goal of consumer nodes is the selection of the best services among the huge multitude provided by the network. As basic criteria for this choice, service cost and Quality-of-Service (QoS) can be considered, provided that the underlying Service-Oriented Architecture (SOA) be augmented in order to support the declaration of this information. The correct behavior of such new SOA platforms, however, will depend on the presence of some mechanisms that allow consumer nodes to evaluate trustworthiness of service providers. This work proposes a new…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniService (systems architecture)Distributed SOAbusiness.industryComputer sciencecomputer.internet_protocolQuality of servicemedia_common.quotation_subjectMobile QoSService-oriented architectureService providercomputer.software_genreComputer securityQoS-based Service SelectionThe InternetReputation ManagementWeb servicebusinesscomputerComputer networkReputationmedia_common2010 Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshop
researchProduct

SpADe: Multi-Stage Spam Account Detection for Online Social Networks

2022

In recent years, Online Social Networks (OSNs) have radically changed the way people communicate. The most widely used platforms, such as Facebook, Youtube, and Instagram, claim more than one billion monthly active users each. Beyond these, news-oriented micro-blogging services, e.g., Twitter, are daily accessed by more than 120 million users sharing contents from all over the world. Unfortunately, legitimate users of the OSNs are mixed with malicious ones, which are interested in spreading unwanted, misleading, harmful, or discriminatory content. Spam detection in OSNs is generally approached by considering the characteristics of the account under analysis, its connection with the rest of …

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSocial Network Security Spam Detection Artificial IntelligenceElectrical and Electronic EngineeringIEEE Transactions on Dependable and Secure Computing
researchProduct

Twitter spam account detection by effective labeling

2019

In the last years, the widespread diffusion of Online Social Networks (OSNs) has enabled new forms of communications that make it easier for people to interact remotely. Unfortunately, one of the first consequences of such a popularity is the increasing number of malicious users who sign-up and use OSNs for non-legit activities. In this paper we focus on spam detection, and present some preliminary results of a system that aims at speeding up the creation of a large-scale annotated dataset for spam account detection on Twitter. To this aim, two different algorithms capable of capturing the spammer behaviors, i.e., to share malicious urls and recurrent contents, are exploited. Experimental r…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSocial Network Security Spam Detection Twitter Data Analysis
researchProduct