Search results for "Security"

showing 10 items of 1693 documents

Efficient Hybrid Emergency Aware MAC Protocol for Wireless Body Sensor Networks

2018

International audience; In Body Sensor Networks (BSNs), two types of events should be addressed: periodic and emergency events. Traffic rate is usually low during periodic observation, and becomes very high upon emergency. One of the main and challenging requirements of BSNs is to design Medium Access Control (MAC) protocols that guarantee immediate and reliable transmission of data in emergency situations, while maintaining high energy efficiency in non-emergency conditions. In this paper, we propose a new emergency aware hybrid DTDMA/DS-CDMA protocol that can accommodate BSN traffic variations by addressing emergency and periodic traffic requirements. It takes advantage of the high delay …

Computer sciencedelayAccess control02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]DTDMAlcsh:Chemical technology01 natural sciencesBiochemistryArticleAnalytical Chemistry[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingBSN[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]energy consumption0202 electrical engineering electronic engineering information engineeringWirelesslcsh:TP1-1185Electrical and Electronic EngineeringInstrumentationMACbusiness.industryNetwork packet010401 analytical chemistryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunicationsEnergy consumption[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationAtomic and Molecular Physics and Optics0104 chemical sciences[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]packet drop[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkEfficient energy useComputer networkDS-CDMAOPNETSensors
researchProduct

Evaluation of Ensemble Machine Learning Methods in Mobile Threat Detection

2017

The rapid growing trend of mobile devices continues to soar causing massive increase in cyber security threats. Most pervasive threats include ransom-ware, banking malware, premium SMS fraud. The solitary hackers use tailored techniques to avoid detection by the traditional antivirus. The emerging need is to detect these threats by any flow-based network solution. Therefore, we propose and evaluate a network based model which uses ensemble Machine Learning (ML) methods in order to identify the mobile threats, by analyzing the network flows of the malware communication. The ensemble ML methods not only protect over-fitting of the model but also cope with the issues related to the changing be…

Computer scienceintrusion detection0211 other engineering and technologiesDecision tree02 engineering and technologycomputer.software_genreComputer securitymobiililaitteet0202 electrical engineering electronic engineering information engineeringsupervised machine learningSoarAndroid (operating system)tietoturvata113021110 strategic defence & security studiesta213business.industrymobile threatsensemble methods020206 networking & telecommunicationsFlow networkEnsemble learninganomaly detectionmachine learningkoneoppiminenMalwareThe InternetbusinesscomputerMobile device
researchProduct

Behavioural Issues in Cybersecurity

2020

Computer securitycomputer.software_genrecomputer
researchProduct

An Enhanced Authentication System for the JADE-S Platform

2004

Multi-agent systems require a set of security mechanism threats such as confidentiality, privacy, authentication, data integrity, access control. Authentication is the process of deducing which user has made a specific request in a multi-agent system. The goal of authentication is to allow legitimate system entities to process while denying illegitimate ones. The JADE-S platform requires that users must be authenticated, providing a username and password, in order to be able to perform actions on the platform. In this paper an enhanced user authentication system for the JADE-S platform, requiring user fingerprint in addition to the standard items, is outlined. Due to their uniqueness and im…

ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSData_MISCELLANEOUSFingerprintsJADE-SSecurityAuthentication SystemsMulti-Agent Systems
researchProduct

Too many passwords? : How understanding our memory can increase password memorability

2018

Passwords are the most common authentication mechanism, that are only increasing with time. Previous research suggests that users cannot remember multiple passwords. Therefore, users adopt insecure password practices, such as password reuse in response to their perceived memory limitations. The critical question not currently examined is whether users’ memory capabilities for password recall are actually related to having a poor memory. This issue is imperative: if insecure password practices result from having a poor memory, then future password research and practice should focus on increasing the memorability of passwords. If, on the other hand, the problem is not solely related to memory…

ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSSoftware_OPERATINGSYSTEMSpassword securitymemorabilitytodentamineninformation securitymetamemorysalasanattietoturvahuman memorymuisti (kognitio)
researchProduct

Improving Password Memorability, While Not Inconveniencing the User

2019

Passwords are the most frequently used authentication mechanism. However, due to increased password numbers, there has been an increase in insecure password behaviors (e.g., password reuse). Therefore, new and innovative ways are needed to increase password memorability and security. Typically, users are asked to input their passwords once in order to access the system, and twice to verify the password, when they create a new account. But what if users were asked to input their passwords three or four times when they create new accounts? In this study, three groups of participants were asked to verify their passwords once (control group), twice, and three times (two experimental groups). Ps…

ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSSoftware_OPERATINGSYSTEMSpassword securitypassword security behaviorturvallisuuspassword memorabilityuser conveniencemuistaminensalasanatkäyttäjäkokemuspassword verificationtoisto
researchProduct

Frequently Using Passwords Increases Their Memorability - A False Assumption or Reality?

2017

Password memorability is a significant problem that is getting worse as the numbers grow. As a direct result of memory limitations, adopted insecure password practices have substantial consequences as organizations lose millions to security breaches and helpdesk costs. IS research has examined memory theories to increase the memorability of passwords. However, in our research we have discovered some anomalous findings. It is commonly known that more frequently and recently recalled information is more easily remembered (assumed for password recall also); our previously collected objective data revealed no effect on password recall. This study will strive to confirm whether or not password m…

ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSmemorabilityinformation securityfrequency of usesecuritymemory theorysalasanat
researchProduct

"Table 1" of "Lowest Q**2 measurement of the gamma* p --> delta reaction: Probing the pionic contribution."

2006

Measured value of SIG(C=T) + EPS*SIG(C=L) as a function of the pion angle relative to the virtual photon direction.

ComputingMilieux_THECOMPUTINGPROFESSIONElectron productionNuclear TheoryIntegrated Cross SectionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONCross SectionSIGInformationSystems_MODELSANDPRINCIPLES7.950E-017.950E-01E- P --> E- PI0 PExclusiveInformationSystems_MISCELLANEOUS1.221ComputingMethodologies_COMPUTERGRAPHICSComputer Science::Cryptography and Security
researchProduct

"Table 2" of "Measurement of inclusive K*(892)0, Phi(1020) and K*2(1430)0 production in hadronic Z decays."

1996

SIG in (1/SIG) is the total hadronic cross section. The erros are statistical ones. The cross sections SIG(C=A), SIG(C=B), and SIG(C=C) obtained with A) both kaons identified, B) at least one kaon identified, and C) without requiring kaon identification.

ComputingMilieux_THECOMPUTINGPROFESSIONGeneralLiterature_INTRODUCTORYANDSURVEYInformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.HCI)Nuclear Theory91.2DSIG/DXInclusiveSingle Differential Cross SectionInformationSystems_MODELSANDPRINCIPLESE+ E- --> PHI XE+ E- ScatteringHigh Energy Physics::ExperimentInformationSystems_MISCELLANEOUSNuclear ExperimentComputer Science::Cryptography and Security
researchProduct

"Table 1" of "Measurement of inclusive K*(892)0, Phi(1020) and K*2(1430)0 production in hadronic Z decays."

1996

SIG in (1/SIG) is the total hadronic cross section. The statistical and systematic errors are combined quadratically.

ComputingMilieux_THECOMPUTINGPROFESSIONStrange productionGeneralLiterature_INTRODUCTORYANDSURVEYInformationSystems_INFORMATIONINTERFACESANDPRESENTATION(e.g.HCI)E+ E- --> K*(892)0 X91.2E+ E- --> K*BAR(892)0 XDSIG/DXInclusiveSingle Differential Cross SectionInformationSystems_MODELSANDPRINCIPLESE+ E- ScatteringInformationSystems_MISCELLANEOUSComputer Science::Cryptography and Security
researchProduct