A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
COMA: Communication and Obfuscation Management Architecture
[article]
2019
arXiv
pre-print
In this paper, we introduce a novel Communication and Obfuscation Management Architecture (COMA) to handle the storage of the obfuscation key and to secure the communication to/from untrusted yet obfuscated ...
as a service (for IoT devices), reducing the side channel threats on key management architecture, and providing two new means of secure communication to/from an untrusted chip. ...
In this paper, we propose the COMA key-management and communication architecture for secure activation of obfuscated circuits that are manufactured in untrusted foundries and meet the constant connectivity ...
arXiv:1909.00493v1
fatcat:naee66jm4rg6njwn2rgefgap2u
Secure interoperability with O2O contracts
[chapter]
2010
Atlantis Ambient and Pervasive Intelligence
O2O licence administrative view and an XML block based access control technique to obfuscate some of the information exchanged. ...
We specify all the wheelwork of interoperation between organizations which might manage their security policies using access control model RBAC 2 and/or OrBAC. 3 Furthermore, as interoperation may lead ...
Due to the existence of these two kinds of blocks, according to XML-BB block concept, we have two ways to obfuscate security policies: the generic obfuscation and the specific obfuscation. ...
doi:10.2991/978-94-91216-32-9_11
fatcat:nwrif3jr2zgmln4z4d3gitv4y4
Wireless Network Security: The Mobile Agent Approach
2013
International Journal of Communications, Network and System Sciences
solution and propose a model for wireless network security. ...
The present 802.1× authentication scheme has some flaws, making mutual authentication impossible and open to man-in-the-middle attacks. ...
Figure 5 shows a generic mobile agent framework, with agent manager, event manager, security manager and persistent manager. ...
doi:10.4236/ijcns.2013.610046
fatcat:6nonkx5rtjgynpmhwnm3k5iyo4
A Survey on Recent Advanced Research of CPS Security
2021
Applied Sciences
Cyber-physical systems (CPSs) are next-generation intelligent systems that integrate computing, communication, and control. Malicious attacks on CPSs can lead to both property damage and casualties. ...
Then, we analyze hotspots and trends of CPS security technologies in three dimensions: (1) architecture layers (perception, network, and application); (2) application scenarios (smart grids, health care ...
[106] proposed a communication and obfuscation management architecture (COMA) to securely activate obfuscated circuits made in untrusted foundries. ...
doi:10.3390/app11093751
fatcat:fxby2wjzpnchrfshvilxalmptm
Multifeature-Based Behavior of Privilege Escalation Attack Detection Method for Android Applications
2020
Mobile Information Systems
The accuracy and effectiveness of the proposed method were verified using the DroidBench benchmark test and the test set that includes 55 APKs of 22 types. ...
On the basis of the extraction of multiple features, process algebra was used to build the application-behavior model and the attack model. ...
F2017203307), and Science and Technology Project of Hebei Province (no. 17210701D). ...
doi:10.1155/2020/3407437
fatcat:ep7iucdyancdblwcs74djgamiy
Model-Based Development of Distributed Embedded Systems by the Example of the Scicos/SynDEx Framework
[article]
2010
arXiv
pre-print
in dynamic and static memory compared to a hand-written approach. ...
Abilities to quickly adapt to changes, develop products with safe design, minimize project costs, and deliver timely are needed. ...
A thread is assigned to every communication medium: thread (COMA,c,node0,node1,node2,node3) for communication medium comA and thread (COMB, e, node0, PC) for comB: The parameters defined are the communication ...
arXiv:1010.4065v1
fatcat:4uhizl3h6jbjlmjvh5awwo6cy4
e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices
[article]
2018
arXiv
pre-print
To facilitate monitoring and management, modern Implantable Medical Devices (IMDs) are often equipped with wireless capabilities, which raise the risk of malicious access to IMDs. ...
Motivated by these important yet open problems, we propose an innovative scheme e-SAFE, which significantly improves security and safety, reduces the communication overhead and enables IMD-access forensics ...
To make it more convenient to monitor patients' health status and manage IMDs' configuration, many IMDs are equipped with wireless interfaces, enabling wireless communication between IMDs and an external ...
arXiv:1804.02447v1
fatcat:gdubd4bqqffz7arz5taq6b2phe
A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning
[article]
2022
arXiv
pre-print
Instead, what they deliver is basically noise addition similar to the traditional (and often criticized) statistical disclosure control approach. ...
Domingo-Ferrer and D. Sánchez), and UK Research and Innovation (project MC PC 21033 "GRAIMatter"). The opinions in this paper are the authors' own and do not commit UNESCO or any of the funders. ...
Acknowledgments Partial support to this work has been received from the European Commission (projects H2020-871042 "So-BigData++" and H2020-101006879 "MobiDataLab"), the Norwegian Research Council (project ...
arXiv:2206.04621v1
fatcat:z6hx4yidovfadaxrw7p74a6gm4
Intelligent Air Pollution Monitoring System for Smart Cities Using IoT and Machine Learning
2021
International Journal of Advanced Trends in Computer Science and Engineering
MQ-2, MQ-7 and MQ-135 are used for sensing the level of methane, carbon monoxide and for measuring air quality, respectively. A buzzer is used to identify any unusual condition. ...
This system will undoubtedly be on humans' behalf in such a way that a smart city will have much less time for spending, and there will undoubtedly be other industries, and the air will undoubtedly be ...
brain damage, coma, and even death. ...
doi:10.30534/ijatcse/2021/1281022021
fatcat:au7uyxb6tjhilegdtg45qzhyza
Clinical Concepts Emerging from fMRI Functional Connectomics
2016
Neuron
Although fMRI has not become a routine clinical tool, research already has had important influences on clinical concepts guiding diagnosis and patient management. ...
Studies of pain and consciousness have catalyzed reconsiderations of approaches to clinical management, but also have stimulated debate about the clinical meaningfulness of differences in internal perceptual ...
PMM is in receipt of generous personal and research support from the Edmond J Safra Foundation and Lily Safra, the Medical Research Council and the Engineering and Physics Science Research Council for ...
doi:10.1016/j.neuron.2016.07.031
pmid:27497220
fatcat:plsrga55wfeh5jr6a7htpbqtw4
Program book
2010
2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW 2010)
Winter is a frequent author and speaker; and, teaches seminars on scalability management, including the architecture and selection of data warehouse platforms. ...
Richard Winter is an industry expert in large scale data management technology, architecture and implementation with over twenty-five years of experience. ...
Streaming Data Integration: Challenges and Opportunities The amount of attention the research community has devoted to social networks has so far not kept up with their growth in popularity and overall ...
doi:10.1109/icdew.2010.5452773
fatcat:oyq2tujbvjfpxjlyixux5q57vu
4. Social Reproduction Practices
[chapter]
2020
The Body in Late-Capitalist USA
The new right react against the recent changes by rallying around the traditional ideas of nation, community, and family. ...
Human beings are in effect «localized in a system architecture whose basic modes of operation are probabilistic." ...
doi:10.1515/9780822381969-006
fatcat:7zard44ypnd75lraglojiyayqi
Deep Reinforcement Learning
[article]
2018
arXiv
pre-print
After that, we discuss RL applications, including games, robotics, natural language processing (NLP), computer vision, finance, business management, healthcare, education, energy, transportation, computer ...
systems, and, science, engineering, and art. ...
The authors propose policy-space response oracle (PSRO), and its approximation, deep cognitive hierarchies (DCH), to compute best responses to a mixture of policies using deep RL, and to compute new meta-strategy ...
arXiv:1810.06339v1
fatcat:kp7atz5pdbeqta352e6b3nmuhy
Toward Social Material Flow Analysis: On the Usefulness of Boundary Objects in Urban Mining Research
2015
Journal of Industrial Ecology
Acknowledgements Financial support from the Swedish Research Council for Environment, Agricultural Sciences and Spatial Planning, FORMAS, and the Swedish Innovation Agency, VINNOVA, is gratefully acknowledged ...
people, texts, devices, city councils, architectures, economics and all the rest" (Law 1991 p. 9) . ...
From left to right, they relate to everyday work with maintenance and repair (dormant cells), urban re-development projects (paralysis) and system obsolescence (coma). ...
doi:10.1111/jiec.12361
fatcat:hwx5oxvlqvbplaeoeds6kd2pmu
Crowdfunding and global health disparities: an exploratory conceptual and empirical analysis
2019
Globalization and Health
To map and document how medical crowdfunding is shaped by, and shapes, health disparities, this article offers an exploratory conceptual and empirical analysis of medical crowdfunding platforms and practices ...
The popularity of such "medical crowdfunding" is fueled by health disparities and gaps in health coverage and social safety-net systems. ...
She has also served as an important and ongoing interlocutor for many of the overarching ideas included in this article. ...
doi:10.1186/s12992-019-0519-1
pmid:31775896
pmcid:PMC6882318
fatcat:osfl4qlyuvaqzirblnbcnfysti
« Previous
Showing results 1 — 15 out of 119 results