1,844 Hits in 6.6 sec

A system testbed for modeling encrypted video-streaming service performance indicators based on TCP/IP metrics

Pablo Oliver-Balsalobre, Matías Toril, Salvador Luna-Ramírez, Rafael García Garaluz
2017 EURASIP Journal on Wireless Communications and Networking  
For illustration purposes, the testbed is used to derive the formulas to compute video performance metrics from TCP/IP metrics for encrypted YouTube traffic in a Wi-Fi network.  ...  In this paper, a system testbed is presented for automatically constructing a simple, albeit accurate, Quality-of-Experience (QoE) model for encrypted video-streaming services in a wireless network.  ...  Acknowledgements This work has been funded by the Spanish Ministry of Economy and Competitiveness (TEC2015-69982-R) and Ericsson.  ... 
doi:10.1186/s13638-017-0999-8 fatcat:ptlgrntblzfmxhljohxuxgfe34

Towards Cyber Security Risks Assessment in Electric Utility SCADA Systems

Pil Sung Woo, Balho H. Kim, Don Hur
2015 Journal of Electrical Engineering and Technology  
This paper presents a unified model based assessment framework to quantify threats and vulnerabilities associated with control systems, especially in the SCADA (Supervisory Control and Data Acquisition  ...  In short, the purpose of this paper is to streamline a comprehensive approach to prioritizing cyber security risks which are expressed by the combination of threats, vulnerabilities, and values in the  ...  essential architecture and methodology to estimate the risks in the SCADA system.  ... 
doi:10.5370/jeet.2015.10.3.888 fatcat:rmgks4idqrcrdlwbwy446bnzsi

Design of a Methodology for Assessing an Electrocardiographic Telemonitoring System

A. Alfonzo, M. K. Huerta, S. Wong, G. Passariello, M. Diaz, A. La Cruz, J. Cruz
2007 IEEE Engineering in Medicine and Biology Society. Conference Proceedings  
In this work a methodology to evaluate an electrocardiographic telemonitoring system is presented.  ...  of the Quality of Service (QoS) parameters required by the system in a Local Area Network (LAN).  ...  to TCP/IP.  ... 
doi:10.1109/iembs.2007.4353142 pmid:18002808 fatcat:kua6kqte3fagjmnjqrif46hlb4

Cyber-vulnerability of power grid monitoring and control systems

Chee-Wooi Ten, Chen-Ching Liu, Manimaran Govindarasu
2008 Proceedings of the 4th annual workshop on Cyber security and informaiton intelligence research developing strategies to meet the cyber security and information intelligence challenges ahead - CSIIRW '08  
In this paper, a methodology is proposed for the evaluation of the impact of cyber attacks on the power grid.  ...  An IEEE 30 bus system is used to build a test case for the proposed method.  ...  The integration of these two models makes it possible to quantify the impact caused by a potential cyber attack. Fig. 1. Cyber-Attack upon Power Systems The proposed methodology can be used to: 1.  ... 
doi:10.1145/1413140.1413190 fatcat:rxprnlx2lnbijo5a47v6vom4fm

A Self-Adaptive Network Protection System [article]

Mohamed Hassan
2015 arXiv   pre-print
In this treatise we aim to build a hybrid network automated (self-adaptive) security threats discovery and prevention system; by using unconventional techniques and methods, including fuzzy logic and biological  ...  inspired algorithms under the context of soft computing.  ...  : → Firewalls, Intrusion Detection System (IDS's), Proxies, VPN's, and TCP/IP network management and analysis. • Communication Security: Ultimately, the communication security is the matter of securing  ... 
arXiv:1405.1958v2 fatcat:2mmr673xzzb7nhsokoiaonneuy

Mitigating Systemic Risks in Future Networks [article]

Antonio Manzalini
2012 arXiv   pre-print
This paper elaborates about the potential risk of systemic instabilities in future networks and proposes a methodology to mitigate it.  ...  Methodology foresees defining and associating utility functions to these controllers and elaborating a global utility function (as a function of the controllers' utility functions) for the overall network  ...  TCP/IP protocol can be seen as an example of optimizer: objective is to maximize the sum of source utilities (as functions of rates) with constraints on resources (figure 3).  ... 
arXiv:1204.5056v1 fatcat:ufmrutk74fa3xdvn5adlgkfzki

Cybersecurity for electric power control and automation systems

Chee-Wooi Ten, Manimaran Govindarasu, Chen-Ching Liu
2007 2007 IEEE International Conference on Systems, Man and Cybernetics  
Due to the complexity of widely dispersed assets and the interdependency between computer, communication, and power systems, the requirement to meet security and quality compliance on the operations is  ...  In recent years, NERC's cybersecurity standard was initiated to require utilities compliance on cybersecurity in control systems -NERC CIP 1200.  ...  ACKNOWLEDGMENT The authors gratefully acknowledge the contributions of Srdjan Pudar, Mohammad Fraiwan, and the support of Electric Power Research Center (EPRC) at Iowa State University.  ... 
doi:10.1109/icsmc.2007.4414239 dblp:conf/smc/TenGL07 fatcat:adklypijfbezhakngraiakqplq

Smart Patient Monitoring System

Sabeena P, Uma Sheeri, Divya Mourya
2022 European Journal of Information Technologies and Computer Science  
The system's results were promising: the data collected by the system was saved fast. The system's results were found to be accurate when compared to other commercially available devices.  ...  IoT-based gadgets could be immensely valuable in saving people's lives during the COVID-19 epidemic.  ...  In this game plan, the DHT11 is simply used to quantify room moistness.  ... 
doi:10.24018/compute.2022.2.2.53 fatcat:55rbe5hpsbe7ll3l7hjp6pchki

Cyber-Physical System Security and Impact Analysis

Alexandru Stefanov, Chen-Ching Liu
2014 IFAC Proceedings Volumes  
This paper describes the importance of cyber security for power systems.  ...  The impact analysis' simulation results capture the dynamic behavior of IEEE 39-bus system as a response to cyber attacks which may evolve into a partial or complete blackout.  ...  ACKNOWLEDGEMENT This research was supported by Science Foundation Ireland at University College Dublin through a Principal Investigator Award and the follow-on work is partially sponsored by U.S.  ... 
doi:10.3182/20140824-6-za-1003.00528 fatcat:y2hizvpimvaztikqv3q3weezqa

Measuring systems security

Jennifer Bayuk, Ali Mostashari
2012 Systems Engineering  
It describes the evolution of currently popular security metrics, and classifies them to illustrate their utility in systems engineering verification and validation activities.  ...  It provides criteria with which to evaluate security metrics based on system purpose and architecture. The criteria are illustrated using a case study of Cloud System security.  ...  features rich enough to maintain their Orange Book compliance ratings once they were augmented to accept TCP/IP input.  ... 
doi:10.1002/sys.21211 fatcat:jbvmgkh6o5hyrhgrh44ma54ysa

Methodology of Cyber Security Assessment in the Smart Grid

Pil Sung Woo, Balho H. Kim
2017 Journal of Electrical Engineering and Technology  
This paper aims to identify and clarify the cyber security risks and their interaction with the power system in Smart Grid.  ...  In this study, the optimal power flow (OPF) and Power Flow Tracing are used to assess the interaction between the EMS and the power system.  ...  (TCP/IP, Serial), and RTU that control the power system.  ... 
doi:10.5370/jeet.2017.12.2.495 fatcat:pxjwretfdncgdnvc3yeczxcrr4

Communication Architecture in the Chosen Telematics Transport Systems [chapter]

Mirosaw Siergiejczyk
2012 Modern Information Systems  
Adequately designed and equipped TCP/IP network is capable of assuring equally adequate security:  infrastructure security (connection and node redundancy with specific switch-over times in physical,  ...  ARTAS-connected users communicate with the modules also via TCP/IP protocols. ARTAS Units -kilometres from each other -are connected to a wide area network, and communicate via TCP/IP protocol stack.  ...  User needs change dramatically fast and the IT industry copes to reach the level of efficiency and adaptability for its systems in order to be competitive and up-to-date.  ... 
doi:10.5772/38047 fatcat:cqca7i76avbipmouiq4y2r4nbu

Mitigating systemic risks in future networks

Antonio Manzalini, Noel Crespi
2012 2012 IEEE 17th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)  
This paper elaborates about the potential risks of systemic instabilities in future networks and proposes a methodology to control and mitigate them.  ...  The methodology foresees defining and associating utility functions to these controllers and elaborating a global utility function (as an aggregated function of local utilities) for the overall network  ...  ACKNOWLEDGMENT This work is partially supported by the European Commission through the UniverSELF project of the 7 th FP.  ... 
doi:10.1109/camad.2012.6335327 dblp:conf/camad/ManzaliniC12 fatcat:cqfbjazrkvemznbnumevm3muvm

Industry Fire Safety System using Embedded Technology with Internet of Things

2019 International journal of recent technology and engineering  
This paper keeps tabs to the security also security of the article of clothing plant disappointments and outrage on his/her staff need getting to be a most amazing issue currently a times.  ...  We give acceptable connect verification system to Abstain from cautioning. The system could right away send a SMS of the admin. Those admin will verify or deny the data.  ...  It is a microchip with low cost and follows TCP/IP stack. The ESP represents express if systems. It is a 32 bit microcontroller. The memory of ESP8266 is 32KB instruction, 80 KB user data.  ... 
doi:10.35940/ijrte.b1151.0982s1019 fatcat:5oqfrw6pjfefxfquacde5kxhwa

New Approach to Monitoring Internet Access along with Usage of Bandwidth Using Intrusion Detection System

D. Rajagopal, K. Thilakavalli, K. Syed Ali Fathima
2015 International Journal of Security and Its Applications  
The system processes these log files to supply system directors a good vary of report-building choices.  ...  New Approach to observe web Access beside Usage of information measure victimization Intrusion Detection System could be a comprehensive web use observation and news utility for company networks.  ...  The packets examined as they are going through the TCP/IP stack and, therefore, it is not necessary for them to work with the network interface in promiscuous mode.  ... 
doi:10.14257/ijsia.2015.9.6.18 fatcat:paz2bzoaqfg37pz2dwpf3nvwpu
« Previous Showing results 1 — 15 out of 1,844 results