Search results for "Security"

showing 10 items of 1693 documents

Ownership protection of plenoptic images by robust and reversible watermarking

2018

Abstract Plenoptic images are highly demanded for 3D representation of broad scenes. Contrary to the images captured by conventional cameras, plenoptic images carry a considerable amount of angular information, which is very appealing for 3D reconstruction and display of the scene. Plenoptic images are gaining increasing importance in areas like medical imaging, manufacturing control, metrology, or even entertainment business. Thus, the adaptation and refinement of watermarking techniques to plenoptic images is a matter of raising interest. In this paper a new method for plenoptic image watermarking is proposed. A secret key is used to specify the location of logo insertion. Employing discr…

Computer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION0211 other engineering and technologies02 engineering and technologysymbols.namesakeRobustness (computer science)0202 electrical engineering electronic engineering information engineeringDiscrete cosine transformMedian filterComputer visionElectrical and Electronic EngineeringDigital watermarking021110 strategic defence & security studiesbusiness.industryMechanical EngineeringWatermarkÒpticaPeak signal-to-noise ratioAtomic and Molecular Physics and OpticsElectronic Optical and Magnetic MaterialsGaussian noiseHuman visual system modelsymbols020201 artificial intelligence & image processingArtificial intelligencebusinessImatges Processament Tècniques digitalsOptics and Lasers in Engineering
researchProduct

Fuzzy Logic Based Security Trust Evaluation for IoT Environments

2019

In the new technological era called the Internet of Things (IoT), people, machines and objects communicate with each other via the Internet by exchanging information. In this context, trust plays an important role and is considered as a key factor in the success of the IoT services expansion. IoT services and applications use in some cases data concerning the privacy of their users. Consequently, users should trust the entities exchanging their personal information. In this paper, we present a framework that evaluates the security trust level of IoT nodes based on a Fuzzy Logic model using different input parameters such as Device Physical Security, Device Security Level and Device Ownershi…

Computer scienceContext (language use)02 engineering and technology[INFO] Computer Science [cs]TrustComputer securitycomputer.software_genreFuzzy logicFuzzy LogicFactor (programming language)Node (computer science)0202 electrical engineering electronic engineering information engineeringcomputer.programming_languagePrivacy.[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industry020206 networking & telecommunicationsInternet of Things (IoT)SecurityKey (cryptography)020201 artificial intelligence & image processingThe InternetbusinessPersonally identifiable informationcomputerPhysical security2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)
researchProduct

Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks

2020

Gathering and utilizing stored data is gaining popularity and has become a crucial component of smart building infrastructure. The data collected can be stored, for example, into private, public, or hybrid cloud service infrastructure or distributed service by utilizing data platforms. The stored data can be used when implementing services, such as building automation (BAS). Cloud services, IoT sensors, and data platforms can face several kinds of cybersecurity attack vectors such as adversarial, AI-based, DoS/DDoS, insider attacks. If a perpetrator can penetrate the defenses of a data platform, she can cause significant harm to the system. For example, the perpetrator can disrupt a buildin…

Computer scienceDenial-of-service attackCloud computingComputerApplications_COMPUTERSINOTHERSYSTEMStekoälyComputer securitycomputer.software_genreInsiderpilvipalvelutälytalotComponent (UML)cloud servicetietoturvakyberturvallisuusBuilding automationbusiness.industryattack vectorsartificial intelligencePopularityartificial-intelligence-based applicationsHeating systemälytekniikkabusinessdata platformCloud storagecomputerverkkohyökkäykset
researchProduct

Efficient cluster-based routing algorithm for body sensor networks

2018

International audience; Body Sensor Networks have gained a lot of research interest lately for the variety of applications they can serve. In such networks where nodes might hold critical information about people's lives, designing efficient routing schemes is very important to guarantee data delivery with the lowest delay and energy consumption. Even though some cluster-based routing schemes were proposed in the literature, none of them offer a complete solution that guarantees energy and delay efficient routing in BSN. In this paper, we propose a robust cluster- based algorithm that increases the routing efficiency through every step of the routing process: cluster formation, cluster head…

Computer scienceDistributed computing010401 analytical chemistryRouting algorithm020206 networking & telecommunications[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyEnergy consumption[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation01 natural sciences0104 chemical sciences[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]0202 electrical engineering electronic engineering information engineering[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Data delivery[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]MATLABcomputerWireless sensor networkCluster basedcomputer.programming_language2018 IEEE Middle East and North Africa Communications Conference (MENACOMM)
researchProduct

Characteristics and Measures for Mobile-Masquerader Detection

2006

Personal mobile devices, as mobile phones, smartphones, and communicators can be easily lost or stolen. Due to the functional abilities of these devices, their use by an unintended person may result in a severe security incident concerning private or corporate data and services. Organizations develop their security policy and mobilize preventive techniques against unauthorized use. Current solutions, however, are still breakable and there still exists strong need for means to detect user substitution when it happens. A crucial issue in designing such means is to define what measures to monitor.

Computer scienceFunctional abilitiesSubstitution (logic)Computer securitycomputer.software_genreSecurity policycomputerMobile device
researchProduct

Passenger Car Equivalents for Heavy Vehicles at Roundabouts. a Synthesis Review

2019

Passenger Car Equivalents (PCEs in the following) are used to transform a mixed fleet of vehicles into a fleet of equivalent passenger cars and to analyze capacity and level-of-service of roads and intersections. Most roundabouts guidelines propose constant values for PCEs but a single PCE value can result improper under heterogeneous traffic conditions. PCEs should be vary with traffic and road conditions and consequently PCEs applied to undersaturated traffic conditions can overestimate the heavy vehicle effect or be not sensitive to the traffic level or characteristics of heavy vehicles. Compared to other at-grade intersections, the interaction between the operational performances of the…

Computer scienceGeography Planning and Development0211 other engineering and technologiesMicrosimulation020101 civil engineering02 engineering and technology0201 civil engineeringTransport engineeringlcsh:HT165.5-169.9roundaboutSettore ICAR/04 - Strade Ferrovie Ed Aeroporti021110 strategic defence & security studiesheavy vehiclescapacitymicrosimulationTraffic simulationBuilding and Constructionlcsh:City planningTraffic flowUrban Studiespassenger car equivalentlcsh:TA1-2040Traffic conditionsRoundaboutstatistical methodsPassenger car equivalentEstimation methodslcsh:Engineering (General). Civil engineering (General)Frontiers in Built Environment
researchProduct

Multi-agent Systems for Estimating Missing Information in Smart Cities

2019

International audience; Smart cities aim at improving the quality of life of citizens. To do this, numerous ad-hoc sensors need to be deployed in a smart city to monitor the environmental state. Even if nowadays sensors are becoming more and more cheap their installation and maintenance costs increase rapidly with their number. This paper makes an inventory of the dimensions required for designing an intelligent system to support smart city initiatives. Then we propose a multi-agent based solution that uses a limited number of sensors to estimate at runtime missing information in smart cities using a limited number of sensors.

Computer scienceMulti-agent system020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genre[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Missing Information EstimationSmart city11. Sustainability0202 electrical engineering electronic engineering information engineeringSmart City020201 artificial intelligence & image processingState (computer science)Cooperative Multi-agent Systemscomputer
researchProduct

A Software Package for a Serum Bank Management

1979

A serum-bank is a collection of human serum samples coming from different locations (in our case Children Hospital, schools, factories, town departemens), allocated in some archives. Principal users of a such data-bank are, of course, physicians and biologists that are mainly interested in statistical analysis (computation of averages, variances factor analysis, etc.) of immunological and epidemiological relevance, in order to investigate about some haematochemical parameters common to some selected subset of the archives [1], [2].

Computer sciencePrincipal (computer security)Relevance (information retrieval)Statistical analysisOperations managementMarketingSoftware packageSerum samplesBank management
researchProduct

Experimental evaluation of privacy-preserving aggregation schemes on planetlab

2015

New pervasive technologies often reveal many sen- sitive information about users’ habits, seriously compromising the privacy and sometimes even the personal security of people. To cope with this problem, researchers have developed the idea of privacy-preserving data mining which refers to the possibility of releasing aggregate information about the data provided by multiple users, without any information leakage about individual data. These techniques have different privacy levels and communication costs, but all of them can suffer when some users’ data becomes inaccessible during the operation of the privacy preserving protocols. It is thus interesting to validate the applicability of such…

Computer sciencePrivacy softwareSettore ING-INF/03 - TelecomunicazioniAggregate (data warehouse)aggregationComputer securitycomputer.software_genreprivacySecret sharingInformation sensitivityPlanetLabInformation leakageSecure multi-party computationcomputer
researchProduct

On the darker side of C++

1988

We discuss several negative features and properties of the C++ language, some common with C, others pertaining to C++ classes. Remedies are proposed for most of the latter ones, most of the former ones being feared to be already incurable. The worst class-related defects claimed in present C++ have to do with free store management. Some hints are given to programmers on how to avoid pitfalls.

Computer scienceProgramming languageObject-orientationComputer securitycomputer.software_genrecomputer
researchProduct