Search results for "Security"

showing 10 items of 1693 documents

A Study of a Social Behavior inside the Online Black Markets

2010

Illegal activities in cyberspace involving software vulnerabilities have resulted in tangible damage on computer-based environments. Lately, online black market sites for trading stolen goods, credentials, malware and exploit kits have been intensively examined. The market players are identifiably a group of loosely tied individuals but posses shared interests. However, their social behavior has only been discussed in a limited manner. This paper examines the arrangement of the market insiders’ social behavior that enables such forums to continue or discontinue their operation and become a meaningful threat to security. The results reveal that particular formal and informal regulations and …

Exploitbusiness.industryComputer scienceInternet privacycomputer.software_genreComputer securitySoftwareMalwareThe InternetBlack marketbusinessCyberspacecomputerCyber threats2010 Fourth International Conference on Emerging Security Information, Systems and Technologies
researchProduct

A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments

2007

A man-in-the-middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing or data manipulation, without the end hosts being aware of it. Usually these attacks exploit security flaws in the implementation of the ARP protocol at hosts. Up to now, detecting such attacks required setting up a machine with special-purpose software for this task. As an additional problem, few intrusion detection systems (IDS) are able to prevent MitM attacks. In this work we present a low-cost embedded IDS which, when plugged into a switch or hub, is able to detect and/or prevent MitM attacks automatically and …

Exploitbusiness.industryComputer scienceLocal area networkNetwork interfaceIntrusion detection systemMan-in-the-middle attackComputer securitycomputer.software_genreTask (computing)Packet analyzerAddress Resolution ProtocolbusinesscomputerComputer networkThe International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)
researchProduct

NATO Advanced Research Workshop on Explosives Detection

2019

As of 2017, there are an estimated 100 million abandoned land mines littered across 61 countries. Following the wars in Afghanistan, Libya, Syria, Yemen, and Ukraine, there has been a rise in casualties due to the triggering of previously-abandoned explosive devices. The above institutions combined specialties to develop a remotely-operable, multisensor, robotic device for the detection of land mines, UXO (1), and IEDs (2). The robotic detection device uses novel subsurface radar with imaging and target classification to differentiate between threatening landmines and innocuous clutter. The expected outcome of this research is the creation of a multi-sensor system on a semi-autonomous vehic…

Explosive materialComputer sciencelawExplosive detectionClutterRadarAutonomous system (mathematics)Computer securitycomputer.software_genrecomputerlaw.invention
researchProduct

ISARIC-COVID-19 dataset: A Prospective, Standardized, Global Dataset of Patients Hospitalized with COVID-19

2022

The International Severe Acute Respiratory and Emerging Infection Consortium (ISARIC) COVID-19 dataset is one of the largest international databases of prospectively collected clinical data on people hospitalized with COVID-19. This dataset was compiled during the COVID-19 pandemic by a network of hospitals that collect data using the ISARIC-World Health Organization Clinical Characterization Protocol and data tools. The database includes data from more than 705,000 patients, collected in more than 60 countries and 1,500 centres worldwide. Patient data are available from acute hospital admissions with COVID-19 and outpatient follow-ups. The data include signs and symptoms, pre-existing como…

EğitimSocial Sciences and HumanitiesInformation Security and ReliabilitySocial Sciences (SOC)Sosyal Bilimler ve Beşeri BilimlerEpidemiologyEDUCATION & EDUCATIONAL RESEARCHTemel Bilimler (SCI)BİLGİSAYAR BİLİMİ BİLGİ SİSTEMLERİMATHEMATICSSociology[SDV.MHEP.MI]Life Sciences [q-bio]/Human health and pathology/Infectious diseasesProspective StudiesCOMPUTER SCIENCE INFORMATION SYSTEMSSTATISTICS & PROBABILITYMatematikBilgisayar Bilimi UygulamalarıComputer SciencesBilgi Güvenliği ve GüvenilirliğiEĞİTİM VE EĞİTİM ARAŞTIRMASIBİLGİ BİLİMİ VE KÜTÜPHANE BİLİMİBilgi sistemiComputer Science ApplicationsKütüphane ve Bilgi BilimleriHospitalizationNatural Sciences (SCI)Physical SciencesEngineering and TechnologySosyal Bilimler (SOC)Bilgisayar BilimiStatistics Probability and UncertaintyInformation SystemsHumanStatistics and ProbabilityHumans; Pandemics; Prospective Studies; SARS-CoV-2; COVID-19; HospitalizationSOCIAL SCIENCES GENERALLibrary and Information SciencesEducationSDG 3 - Good Health and Well-beingLibrary SciencesINFORMATION SCIENCE & LIBRARY SCIENCEİstatistik ve OlasılıkHumansSosyal ve Beşeri BilimlerBilgisayar BilimleriSocial Sciences & HumanitiesEngineering Computing & Technology (ENG)SosyolojiPandemicsPandemicSARS-CoV-2İSTATİSTİK & OLASILIKCOVID-19Mühendislik Bilişim ve Teknoloji (ENG)İstatistik Olasılık ve BelirsizlikSosyal Bilimler GenelCOMPUTER SCIENCEProspective StudieFizik BilimleriViral infectionMühendislik ve TeknolojiKütüphanecilik
researchProduct

A robust blind 3-D mesh watermarking based on wavelet transform for copyright protection

2019

Nowadays, three-dimensional meshes have been extensively used in several applications such as, industrial, medical, computer-aided design (CAD) and entertainment due to the processing capability improvement of computers and the development of the network infrastructure. Unfortunately, like digital images and videos, 3-D meshes can be easily modified, duplicated and redistributed by unauthorized users. Digital watermarking came up while trying to solve this problem. In this paper, we propose a blind robust watermarking scheme for three-dimensional semiregular meshes for Copyright protection. The watermark is embedded by modifying the norm of the wavelet coefficient vectors associated with th…

FOS: Computer and information sciences0209 industrial biotechnologyComputer sciencevideo watermarking02 engineering and technologyWatermarkingimage watermarking020901 industrial engineering & automationWaveletcopy protectionvectorsRobustness (computer science)Computer Science::Multimedia0202 electrical engineering electronic engineering information engineeringwavelet coefficient vectorsControlled IndexingComputer visionPolygon meshQuantization (image processing)RobustnessDigital watermarkingComputingMilieux_MISCELLANEOUSComputer Science::Cryptography and SecurityQuantization (signal)digital watermarkingbusiness.industrycopyrightedge normal normsWavelet transformunauthorized usersWatermarkThree-dimensional meshesMultimedia (cs.MM)mesh generationwavelet transformssynchronizing primitives3D semiregular meshesSolid modelingrobust blind 3D mesh watermarking020201 artificial intelligence & image processingArtificial intelligenceLaplacian smoothingbusinessCopyright protection[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingComputer Science - Multimediaimage resolutionDigital images
researchProduct

Finding optimal finite biological sequences over finite alphabets: the OptiFin toolbox

2017

International audience; In this paper, we present a toolbox for a specific optimization problem that frequently arises in bioinformatics or genomics. In this specific optimisation problem, the state space is a set of words of specified length over a finite alphabet. To each word is associated a score. The overall objective is to find the words which have the lowest possible score. This type of general optimization problem is encountered in e.g 3D conformation optimisation for protein structure prediction, or largest core genes subset discovery based on best supported phylogenetic tree for a set of species. In order to solve this problem, we propose a toolbox that can be easily launched usin…

FOS: Computer and information sciences0301 basic medicineTheoretical computer scienceOptimization problemComputer Science - Artificial IntelligenceComputer science[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]Quantitative Biology - Quantitative MethodsSet (abstract data type)[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing03 medical and health sciences[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]State spaceMetaheuristicQuantitative Methods (q-bio.QM)Protein structure prediction[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationToolboxCore (game theory)Artificial Intelligence (cs.AI)030104 developmental biology[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]FOS: Biological sciences[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Word (computer architecture)
researchProduct

On the Inner Product Predicate and a Generalization of Matching Vector Families

2018

Motivated by cryptographic applications such as predicate encryption, we consider the problem of representing an arbitrary predicate as the inner product predicate on two vectors. Concretely, fix a Boolean function $P$ and some modulus $q$. We are interested in encoding $x$ to $\vec x$ and $y$ to $\vec y$ so that $$P(x,y) = 1 \Longleftrightarrow \langle\vec x,\vec y\rangle= 0 \bmod q,$$ where the vectors should be as short as possible. This problem can also be viewed as a generalization of matching vector families, which corresponds to the equality predicate. Matching vector families have been used in the constructions of Ramsey graphs, private information retrieval (PIR) protocols, and mor…

FOS: Computer and information sciences060201 languages & linguistics000 Computer science knowledge general worksComputer Science - Cryptography and Security06 humanities and the arts02 engineering and technologyComputational Complexity (cs.CC)Computer Science - Computational Complexity0602 languages and literatureComputer ScienceFOS: Mathematics0202 electrical engineering electronic engineering information engineeringMathematics - Combinatorics020201 artificial intelligence & image processingCombinatorics (math.CO)Cryptography and Security (cs.CR)
researchProduct

Active and inactive quarantine in epidemic spreading on adaptive activity-driven networks

2020

We consider an epidemic process on adaptive activity-driven temporal networks, with adaptive behaviour modelled as a change in activity and attractiveness due to infection. By using a mean-field approach, we derive an analytical estimate of the epidemic threshold for SIS and SIR epidemic models for a general adaptive strategy, which strongly depends on the correlations between activity and attractiveness in the susceptible and infected states. We focus on strong social distancing, implementing two types of quarantine inspired by recent real case studies: an active quarantine, in which the population compensates the loss of links rewiring the ineffective connections towards non-quarantining …

FOS: Computer and information sciences2019-20 coronavirus outbreakAdaptive strategiesPhysics - Physics and SocietyComputer scienceSevere acute respiratory syndrome coronavirus 2 (SARS-CoV-2)PopulationFOS: Physical sciencesPhysics and Society (physics.soc-ph)Computer securitycomputer.software_genre01 natural sciences010305 fluids & plasmaslaw.inventionlawActive phase0103 physical sciencesQuarantinesusceptible-infected-recovered (SIR)010306 general physicseducationCondensed Matter - Statistical MechanicsAdaptive behaviorSocial and Information Networks (cs.SI)education.field_of_studyStatistical Mechanics (cond-mat.stat-mech)Computer Science - Social and Information Networksepidemic modelsusceptible-infected-susceptible (SIS)Epidemic modelcomputer
researchProduct

Security Requirements, Counterattacks and Projects in Healthcare Applications Using WSNs - A Review

2014

Healthcare applications are well thought-out as interesting fields for WSN where patients can be examine using wireless medical sensor networks. Inside the hospital or extensive care surroundings there is a tempting need for steady monitoring of essential body functions and support for patient mobility. Recent research cantered on patient reliable communication, mobility, and energy-efficient routing. Yet deploying new expertise in healthcare applications presents some understandable security concerns which are the important concern in the inclusive deployment of wireless patient monitoring systems. This manuscript presents a survey of the security features, its counter attacks in healthcar…

FOS: Computer and information sciencesComputer Science - Computers and SocietyComputer Science - Cryptography and SecurityComputers and Society (cs.CY)Cryptography and Security (cs.CR)
researchProduct

Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform

2018

In this paper, a robust blind image watermarking method is proposed for copyright protection of digital images. This hybrid method relies on combining two well-known transforms that are the discrete Fourier transform (DFT) and the discrete cosine transform (DCT). The motivation behind this combination is to enhance the imperceptibility and the robustness. The imperceptibility requirement is achieved by using magnitudes of DFT coefficients while the robustness improvement is ensured by applying DCT to the DFT coefficients magnitude. The watermark is embedded by modifying the coefficients of the middle band of the DCT using a secret key. The security of the proposed method is enhanced by appl…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer Networks and CommunicationsComputer scienceMultiple Watermarking02 engineering and technologyDiscrete Fourier transformImage (mathematics)Digital imageDiscrete Fourier transform (DFT)SchemeRobustness (computer science)Quantization0202 electrical engineering electronic engineering information engineeringMedia TechnologyDiscrete cosine transformHybrid method[INFO]Computer Science [cs]Digital watermarkingDiscrete cosine transform (DCT)DistanceImage watermarking020207 software engineeringWatermarkMultimedia (cs.MM)Hardware and ArchitectureMedical ImagesEmbedding020201 artificial intelligence & image processingArnold transformWavelet DomainSvdCryptography and Security (cs.CR)AlgorithmCopyright protectionSoftwareComputer Science - Multimedia
researchProduct