Search results for "Security"
showing 10 items of 1693 documents
Ownership protection of plenoptic images by robust and reversible watermarking
2018
Abstract Plenoptic images are highly demanded for 3D representation of broad scenes. Contrary to the images captured by conventional cameras, plenoptic images carry a considerable amount of angular information, which is very appealing for 3D reconstruction and display of the scene. Plenoptic images are gaining increasing importance in areas like medical imaging, manufacturing control, metrology, or even entertainment business. Thus, the adaptation and refinement of watermarking techniques to plenoptic images is a matter of raising interest. In this paper a new method for plenoptic image watermarking is proposed. A secret key is used to specify the location of logo insertion. Employing discr…
Fuzzy Logic Based Security Trust Evaluation for IoT Environments
2019
In the new technological era called the Internet of Things (IoT), people, machines and objects communicate with each other via the Internet by exchanging information. In this context, trust plays an important role and is considered as a key factor in the success of the IoT services expansion. IoT services and applications use in some cases data concerning the privacy of their users. Consequently, users should trust the entities exchanging their personal information. In this paper, we present a framework that evaluates the security trust level of IoT nodes based on a Fuzzy Logic model using different input parameters such as Device Physical Security, Device Security Level and Device Ownershi…
Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks
2020
Gathering and utilizing stored data is gaining popularity and has become a crucial component of smart building infrastructure. The data collected can be stored, for example, into private, public, or hybrid cloud service infrastructure or distributed service by utilizing data platforms. The stored data can be used when implementing services, such as building automation (BAS). Cloud services, IoT sensors, and data platforms can face several kinds of cybersecurity attack vectors such as adversarial, AI-based, DoS/DDoS, insider attacks. If a perpetrator can penetrate the defenses of a data platform, she can cause significant harm to the system. For example, the perpetrator can disrupt a buildin…
Efficient cluster-based routing algorithm for body sensor networks
2018
International audience; Body Sensor Networks have gained a lot of research interest lately for the variety of applications they can serve. In such networks where nodes might hold critical information about people's lives, designing efficient routing schemes is very important to guarantee data delivery with the lowest delay and energy consumption. Even though some cluster-based routing schemes were proposed in the literature, none of them offer a complete solution that guarantees energy and delay efficient routing in BSN. In this paper, we propose a robust cluster- based algorithm that increases the routing efficiency through every step of the routing process: cluster formation, cluster head…
Characteristics and Measures for Mobile-Masquerader Detection
2006
Personal mobile devices, as mobile phones, smartphones, and communicators can be easily lost or stolen. Due to the functional abilities of these devices, their use by an unintended person may result in a severe security incident concerning private or corporate data and services. Organizations develop their security policy and mobilize preventive techniques against unauthorized use. Current solutions, however, are still breakable and there still exists strong need for means to detect user substitution when it happens. A crucial issue in designing such means is to define what measures to monitor.
Passenger Car Equivalents for Heavy Vehicles at Roundabouts. a Synthesis Review
2019
Passenger Car Equivalents (PCEs in the following) are used to transform a mixed fleet of vehicles into a fleet of equivalent passenger cars and to analyze capacity and level-of-service of roads and intersections. Most roundabouts guidelines propose constant values for PCEs but a single PCE value can result improper under heterogeneous traffic conditions. PCEs should be vary with traffic and road conditions and consequently PCEs applied to undersaturated traffic conditions can overestimate the heavy vehicle effect or be not sensitive to the traffic level or characteristics of heavy vehicles. Compared to other at-grade intersections, the interaction between the operational performances of the…
Multi-agent Systems for Estimating Missing Information in Smart Cities
2019
International audience; Smart cities aim at improving the quality of life of citizens. To do this, numerous ad-hoc sensors need to be deployed in a smart city to monitor the environmental state. Even if nowadays sensors are becoming more and more cheap their installation and maintenance costs increase rapidly with their number. This paper makes an inventory of the dimensions required for designing an intelligent system to support smart city initiatives. Then we propose a multi-agent based solution that uses a limited number of sensors to estimate at runtime missing information in smart cities using a limited number of sensors.
A Software Package for a Serum Bank Management
1979
A serum-bank is a collection of human serum samples coming from different locations (in our case Children Hospital, schools, factories, town departemens), allocated in some archives. Principal users of a such data-bank are, of course, physicians and biologists that are mainly interested in statistical analysis (computation of averages, variances factor analysis, etc.) of immunological and epidemiological relevance, in order to investigate about some haematochemical parameters common to some selected subset of the archives [1], [2].
Experimental evaluation of privacy-preserving aggregation schemes on planetlab
2015
New pervasive technologies often reveal many sen- sitive information about users’ habits, seriously compromising the privacy and sometimes even the personal security of people. To cope with this problem, researchers have developed the idea of privacy-preserving data mining which refers to the possibility of releasing aggregate information about the data provided by multiple users, without any information leakage about individual data. These techniques have different privacy levels and communication costs, but all of them can suffer when some users’ data becomes inaccessible during the operation of the privacy preserving protocols. It is thus interesting to validate the applicability of such…
On the darker side of C++
1988
We discuss several negative features and properties of the C++ language, some common with C, others pertaining to C++ classes. Remedies are proposed for most of the latter ones, most of the former ones being feared to be already incurable. The worst class-related defects claimed in present C++ have to do with free store management. Some hints are given to programmers on how to avoid pitfalls.