Filters








119 Hits in 3.0 sec

COMA: Communication and Obfuscation Management Architecture [article]

Kimia Zamiri Azar, Farnoud Farahmand, Hadi Mardani Kamali, Shervin Roshanisefat, Houman Homayoun, William Diehl, Kris Gaj, Avesta Sasan
2019 arXiv   pre-print
In this paper, we introduce a novel Communication and Obfuscation Management Architecture (COMA) to handle the storage of the obfuscation key and to secure the communication to/from untrusted yet obfuscated  ...  as a service (for IoT devices), reducing the side channel threats on key management architecture, and providing two new means of secure communication to/from an untrusted chip.  ...  In this paper, we propose the COMA key-management and communication architecture for secure activation of obfuscated circuits that are manufactured in untrusted foundries and meet the constant connectivity  ... 
arXiv:1909.00493v1 fatcat:naee66jm4rg6njwn2rgefgap2u

Secure interoperability with O2O contracts [chapter]

Céline Coma, Nora Cuppens-Boulahia, Frédéric Cuppens
2010 Atlantis Ambient and Pervasive Intelligence  
O2O licence administrative view and an XML block based access control technique to obfuscate some of the information exchanged.  ...  We specify all the wheelwork of interoperation between organizations which might manage their security policies using access control model RBAC 2 and/or OrBAC. 3 Furthermore, as interoperation may lead  ...  Due to the existence of these two kinds of blocks, according to XML-BB block concept, we have two ways to obfuscate security policies: the generic obfuscation and the specific obfuscation.  ... 
doi:10.2991/978-94-91216-32-9_11 fatcat:nwrif3jr2zgmln4z4d3gitv4y4

Wireless Network Security: The Mobile Agent Approach

Olatunde Abiona, Adeniran Oluwaranti, Ayodeji Oluwatope, Surura Bello, Clement Onime, Mistura Sanni, Lawrence Kehinde
2013 International Journal of Communications, Network and System Sciences  
solution and propose a model for wireless network security.  ...  The present 802.1× authentication scheme has some flaws, making mutual authentication impossible and open to man-in-the-middle attacks.  ...  Figure 5 shows a generic mobile agent framework, with agent manager, event manager, security manager and persistent manager.  ... 
doi:10.4236/ijcns.2013.610046 fatcat:6nonkx5rtjgynpmhwnm3k5iyo4

A Survey on Recent Advanced Research of CPS Security

Zhenhua Wang, Wei Xie, Baosheng Wang, Jing Tao, Enze Wang
2021 Applied Sciences  
Cyber-physical systems (CPSs) are next-generation intelligent systems that integrate computing, communication, and control. Malicious attacks on CPSs can lead to both property damage and casualties.  ...  Then, we analyze hotspots and trends of CPS security technologies in three dimensions: (1) architecture layers (perception, network, and application); (2) application scenarios (smart grids, health care  ...  [106] proposed a communication and obfuscation management architecture (COMA) to securely activate obfuscated circuits made in untrusted foundries.  ... 
doi:10.3390/app11093751 fatcat:fxby2wjzpnchrfshvilxalmptm

Multifeature-Based Behavior of Privilege Escalation Attack Detection Method for Android Applications

Limin Shen, Hui Li, Hongyi Wang, Yihuan Wang
2020 Mobile Information Systems  
The accuracy and effectiveness of the proposed method were verified using the DroidBench benchmark test and the test set that includes 55 APKs of 22 types.  ...  On the basis of the extraction of multiple features, process algebra was used to build the application-behavior model and the attack model.  ...  F2017203307), and Science and Technology Project of Hebei Province (no. 17210701D).  ... 
doi:10.1155/2020/3407437 fatcat:ep7iucdyancdblwcs74djgamiy

Model-Based Development of Distributed Embedded Systems by the Example of the Scicos/SynDEx Framework [article]

Bernhard Fischer
2010 arXiv   pre-print
in dynamic and static memory compared to a hand-written approach.  ...  Abilities to quickly adapt to changes, develop products with safe design, minimize project costs, and deliver timely are needed.  ...  A thread is assigned to every communication medium: thread (COMA,c,node0,node1,node2,node3) for communication medium comA and thread (COMB, e, node0, PC) for comB: The parameters defined are the communication  ... 
arXiv:1010.4065v1 fatcat:4uhizl3h6jbjlmjvh5awwo6cy4

e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices [article]

Haotian Chi, Longfei Wu, Xiaojiang Du, Qiang Zeng, Paul Ratazzi
2018 arXiv   pre-print
To facilitate monitoring and management, modern Implantable Medical Devices (IMDs) are often equipped with wireless capabilities, which raise the risk of malicious access to IMDs.  ...  Motivated by these important yet open problems, we propose an innovative scheme e-SAFE, which significantly improves security and safety, reduces the communication overhead and enables IMD-access forensics  ...  To make it more convenient to monitor patients' health status and manage IMDs' configuration, many IMDs are equipped with wireless interfaces, enabling wireless communication between IMDs and an external  ... 
arXiv:1804.02447v1 fatcat:gdubd4bqqffz7arz5taq6b2phe

A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning [article]

Alberto Blanco-Justicia, David Sanchez, Josep Domingo-Ferrer, Krishnamurty Muralidhar
2022 arXiv   pre-print
Instead, what they deliver is basically noise addition similar to the traditional (and often criticized) statistical disclosure control approach.  ...  Domingo-Ferrer and D. Sánchez), and UK Research and Innovation (project MC PC 21033 "GRAIMatter"). The opinions in this paper are the authors' own and do not commit UNESCO or any of the funders.  ...  Acknowledgments Partial support to this work has been received from the European Commission (projects H2020-871042 "So-BigData++" and H2020-101006879 "MobiDataLab"), the Norwegian Research Council (project  ... 
arXiv:2206.04621v1 fatcat:z6hx4yidovfadaxrw7p74a6gm4

Intelligent Air Pollution Monitoring System for Smart Cities Using IoT and Machine Learning

2021 International Journal of Advanced Trends in Computer Science and Engineering  
MQ-2, MQ-7 and MQ-135 are used for sensing the level of methane, carbon monoxide and for measuring air quality, respectively. A buzzer is used to identify any unusual condition.  ...  This system will undoubtedly be on humans' behalf in such a way that a smart city will have much less time for spending, and there will undoubtedly be other industries, and the air will undoubtedly be  ...  brain damage, coma, and even death.  ... 
doi:10.30534/ijatcse/2021/1281022021 fatcat:au7uyxb6tjhilegdtg45qzhyza

Clinical Concepts Emerging from fMRI Functional Connectomics

Paul M. Matthews, Adam Hampshire
2016 Neuron  
Although fMRI has not become a routine clinical tool, research already has had important influences on clinical concepts guiding diagnosis and patient management.  ...  Studies of pain and consciousness have catalyzed reconsiderations of approaches to clinical management, but also have stimulated debate about the clinical meaningfulness of differences in internal perceptual  ...  PMM is in receipt of generous personal and research support from the Edmond J Safra Foundation and Lily Safra, the Medical Research Council and the Engineering and Physics Science Research Council for  ... 
doi:10.1016/j.neuron.2016.07.031 pmid:27497220 fatcat:plsrga55wfeh5jr6a7htpbqtw4

Program book

2010 2010 IEEE 26th International Conference on Data Engineering Workshops (ICDEW 2010)  
Winter is a frequent author and speaker; and, teaches seminars on scalability management, including the architecture and selection of data warehouse platforms.  ...  Richard Winter is an industry expert in large scale data management technology, architecture and implementation with over twenty-five years of experience.  ...  Streaming Data Integration: Challenges and Opportunities The amount of attention the research community has devoted to social networks has so far not kept up with their growth in popularity and overall  ... 
doi:10.1109/icdew.2010.5452773 fatcat:oyq2tujbvjfpxjlyixux5q57vu

4. Social Reproduction Practices [chapter]

2020 The Body in Late-Capitalist USA  
The new right react against the recent changes by rallying around the traditional ideas of nation, community, and family.  ...  Human beings are in effect «localized in a system architecture whose basic modes of operation are probabilistic."  ... 
doi:10.1515/9780822381969-006 fatcat:7zard44ypnd75lraglojiyayqi

Deep Reinforcement Learning [article]

Yuxi Li
2018 arXiv   pre-print
After that, we discuss RL applications, including games, robotics, natural language processing (NLP), computer vision, finance, business management, healthcare, education, energy, transportation, computer  ...  systems, and, science, engineering, and art.  ...  The authors propose policy-space response oracle (PSRO), and its approximation, deep cognitive hierarchies (DCH), to compute best responses to a mixture of policies using deep RL, and to compute new meta-strategy  ... 
arXiv:1810.06339v1 fatcat:kp7atz5pdbeqta352e6b3nmuhy

Toward Social Material Flow Analysis: On the Usefulness of Boundary Objects in Urban Mining Research

Björn Wallsten
2015 Journal of Industrial Ecology  
Acknowledgements Financial support from the Swedish Research Council for Environment, Agricultural Sciences and Spatial Planning, FORMAS, and the Swedish Innovation Agency, VINNOVA, is gratefully acknowledged  ...  people, texts, devices, city councils, architectures, economics and all the rest" (Law 1991 p. 9) .  ...  From left to right, they relate to everyday work with maintenance and repair (dormant cells), urban re-development projects (paralysis) and system obsolescence (coma).  ... 
doi:10.1111/jiec.12361 fatcat:hwx5oxvlqvbplaeoeds6kd2pmu

Crowdfunding and global health disparities: an exploratory conceptual and empirical analysis

Nora J. Kenworthy
2019 Globalization and Health  
To map and document how medical crowdfunding is shaped by, and shapes, health disparities, this article offers an exploratory conceptual and empirical analysis of medical crowdfunding platforms and practices  ...  The popularity of such "medical crowdfunding" is fueled by health disparities and gaps in health coverage and social safety-net systems.  ...  She has also served as an important and ongoing interlocutor for many of the overarching ideas included in this article.  ... 
doi:10.1186/s12992-019-0519-1 pmid:31775896 pmcid:PMC6882318 fatcat:osfl4qlyuvaqzirblnbcnfysti
« Previous Showing results 1 — 15 out of 119 results