Filters








13,771 Hits in 3.2 sec

Caprice: a tool for engineering adaptive privacy

Inah Omoronyia, Liliana Pasquale, Mazeiar Salehie, Luca Cavallaro, Gavin Doherty, Bashar Nuseibeh
2012 Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering - ASE 2012  
This paper presents Caprice -a tool for enabling software engineers to design systems that discover and mitigate contextsensitive privacy threats.  ...  To satisfy such changing requirements, there is a need for continuous analysis to discover new threats and possible mitigation actions.  ...  to discover privacy threats, and (3) suggesting possible threat mitigation actions based on the severity of the discovered threat.  ... 
doi:10.1145/2351676.2351745 dblp:conf/kbse/OmoronyiaPSCDN12 fatcat:6uhmp3kzzfa7pdacgfkc5r345e

An adaptive distributed Intrusion detection system architecture using multi agents

Riyad A. M., M. S. Irfan Ahmed, R. L. Raheemaa Khan
2019 International Journal of Electrical and Computer Engineering (IJECE)  
The major issues with these systems are the time taken for analysis, transfer of bulk data from one part of the network to another, high false positives and adaptability to the future threats.  ...  Analysis and detection agents are the mobile agents which are the primary detection modules for detecting intrusions. Their mobility eliminates the transfer of bulk data for processing.  ...  The system is capable of reacting to threats immediately by using the techniques such as packet discard, resetting the connection and alarming to the authorities.  ... 
doi:10.11591/ijece.v9i6.pp4951-4960 fatcat:sdu76exyfbgmbmrvvmo74nck2i

Adaptive security and privacy in smart grids: A software engineering vision

Mazeiar Salehie, Liliana Pasquale, Inah Omoronyia, Bashar Nuseibeh
2012 2012 First International Workshop on Software Engineering Challenges for the Smart Grid (SE-SmartGrids)  
These threats typically manifest themselves at runtime as new usage scenarios arise and vulnerabilities are discovered.  ...  system controls and perhaps even changing requirements.  ...  ACKNOWLEDGMENT This work was supported, in part, by Science Foundation Ireland grant 10/CE/I1855 to Lero -The Irish Software Engineering Research Centre (www.lero.ie).  ... 
doi:10.1109/se4sg.2012.6225718 dblp:conf/icse/SalehiePON12 fatcat:uii52ghpnjgqrnzzvzeylrwhdu

Smartphones and IoT Security

Ioan ADASCALITEI
2019 Informatică economică  
Mobile devices (smartphones or IoT devices) threats are all over and come in many ways.  ...  This paper contains a classification for the threats and vulnerabilities for smartphones and tablets and a short one for IoT devices.  ...  When we talk about any newly discovered incident that can harm a mobile device we talk about mobile security threats and when we talk about vulnerabilities we talk about some already known weakness of  ... 
doi:10.12948/issn14531305/23.2.2019.06 fatcat:hy42ubpq3fdglaclpiio7fqyju

"Network Sentiment" Framework to Improve Security and Privacy for Smart Home

Tommaso Pecorella, Laura Pierucci, Francesca Nizzi
2018 Future Internet  
These two parts must cooperate and integrate their actions for reacting dynamically to new and on going threats.  ...  The paper also presents a test bed for Smart Home to detect and counteract to different attacks against the IoT sensors, Wi-Fi and Ethernet connections.  ...  A gateway architecture is chosen as the most appropriate for resource-constrained devices and for high system availability.  ... 
doi:10.3390/fi10120125 fatcat:iakkkuu5gzehhj6aowwjfuap5m

Security analysis of wireless mesh backhauls for mobile networks

Frank A. Zdarsky, Sebastian Robitzsch, Albert Banchs
2011 Journal of Network and Computer Applications  
This article extends prior security threat analyses of 3rd generation mobile network architectures for the case of wireless mesh backhauls.  ...  It presents a description of the security model for the considered architecture and provides a list of the basic assumptions, security objectives, assets to be protected and actors of the analysis.  ...  This can be used to fingerprint the system and its sub systems, which is useful to discover a suitable attack vector.  ... 
doi:10.1016/j.jnca.2010.03.029 fatcat:kwf5arvtcrgthjwbrs54l4d2wu

Bio-inspired architecture for a reactive-deliberative robot controller

Fabian Rubilar, Maria-Jose Escobar, Tomas Arredondo
2014 2014 International Joint Conference on Neural Networks (IJCNN)  
The architecture is composed of two layers where each layer is intended to react in an analogous way to how our brain reacts to external and internal stimuli, using instinctive or deliberative reactions  ...  An incremental, bio-inspired control architecture for robots is proposed.  ...  INTRODUCTION Our Central Nervous System (CNS) operates in a way that allow us to quickly react to threats and dangerous situations.  ... 
doi:10.1109/ijcnn.2014.6889813 dblp:conf/ijcnn/RubilarEA14 fatcat:qzac7cvvdnggpls4ctoiolsvh4

Predicting Terroristic Attacks in Urban Environments: An Internet-of-Things Approach

Stavros Petris, Christos Georgoulis, John Soldatos
2014 International Journal of Security and Its Applications  
We emphasize on the presentation of the architecture of the IoT system, including a sensor information collection layer, a database for storing terroristic-related  ...  In this paper, we introduce a blueprint Internet-of-Things architecture for predicting terroristic attacks.  ...  The authors acknowledge help and contributions from all partners of the project.  ... 
doi:10.14257/ijsia.2014.8.4.18 fatcat:vo3gom5txvcktm3qunx5y3tove

Context-Aware Ubiquitous Data Mining Based Agent Model for Intersection Safety [chapter]

Flora Dilys Salim, Shonali Krishnaswamy, Seng Wai Loke, Andry Rakotonirainy
2005 Lecture Notes in Computer Science  
for patterns of collisions and factors leading to a collision; (2) learn to recognize potential hazards in intersections from information communicated by road infrastructures, approaching and passing  ...  This research aims to investigate an integration of intelligent software agents and ubiquitous data stream mining, for a novel context-aware framework that is able to: (1) monitor an intersection to learn  ...  However, these projects do not mention the techniques to discover crash patterns and pre-crash behavior associations, which are essential to detecting and reacting to potential threats.  ... 
doi:10.1007/11596042_7 fatcat:skds2argqng4jmpdiyqwoxezyq

A Recent Analysis of Intrusion Detection and Prevention System for Protecting Range of Attack using Data Gathering Technique in MANET

R. Arunkumar, A. Annalakshmi
2014 International Journal of Computer Applications  
based on their architecture and data gathering techniques.  ...  A Mobile Ad-hoc Network (MANET) is a mobile and multihop autonomous operation of wireless network.  ...  Acknowledgments I am indebted to my (PhD) guide Mrs.A.Annalakshmi for giving me an insight on intrusion detection systems.  ... 
doi:10.5120/14859-3230 fatcat:fngee26phfeo7dmxbnu24mouli

An interoperable simulation framework for protecting port as critical infrastructures

Agostino Bruzzone, Francesco Longo, Alberto Tremori
2013 International Journal of System of Systems Engineering  
Due to the complexity of the Port system including several actors and infrastructures, the operations coordination is critical in order to face new asymmetric threats; so interoperable simulation combined  ...  Therefore the proposed framework is useful for the review, testing and certification of Ports Security Plans, Risk Assessments and Gaps Identification as well as for operators training.  ...  crime To prevent and detect these threats it is necessary to focus on regulations and standards, organization and procedures and personnel training in order to proper react by taking into account (Fischer  ... 
doi:10.1504/ijsse.2013.057661 fatcat:zqpado2syjgw3f5io4awrreb5e

Analysis of Security methods in Internet of Things

Saranya C
2015 International Journal on Recent and Innovation Trends in Computing and Communication  
Internet of Things (IoT) is a new revolution for the internet. IoT is to enable things to be connected anytime, anyplace, with anything and anyone ideally using any path/network and any service.  ...  In this paper describes the analysis of security methods in the area of IoT and also describes a protocol which combines zero knowledge proof and key exchange algorithm to provide secure and authenticated  ...  Mobile devices have the ability to monitor the neighbouring devices and report if any threats are detected. After detecting threats they can send warnings to those devices.  ... 
doi:10.17762/ijritcc2321-8169.150446 fatcat:cx7woa2b7jhwjgl2gxofbv5j7i

An Overview of Proactive Forensic Solutions and its Applicability to 5G

Ana Nieto
2018 2018 IEEE 5G World Forum (5GWF)  
In addition, the requirements for deploying proactive forensic solutions in 5G are classified, and analysed based on the specific threats against 5G.  ...  This article analyses the state of the art of proactive forensic solutions and highlights the importance of preparing the 5G ecosystem to serve digital forensic purposes.  ...  The author has been financed by INCIBE through the grant program for excellency in advanced cybersecurity research teams.  ... 
doi:10.1109/5gwf.2018.8516940 dblp:conf/5gwf/Nieto18 fatcat:7hvwa47nxfg7xd7y72v477gkzu

Feast In: A Machine Learning Image Recognition Model of Recipe and Lifestyle Applications

Evelyn Toh Lee Ann, Ng Sze Hao, Goh Wei Wei, Khor Chun Hee, K.S. Chun, C.H. Leng, F.W.Y. Myan, P.S. King, N. Zaman
2021 MATEC Web of Conferences  
In this paper, we propose Feast In, a platform for web and mobile devices which aims to meet a user's needs for home-cooking.  ...  By conducting this research, we were able to propose a unique lifestyle and recipe application which would aid users in searching for the perfect recipe.  ...  Besides that, the author would like to acknowledge their supervisors, Dr. Goh Wei Wei and Mr Khor Chun Hee for guiding throughout the project.  ... 
doi:10.1051/matecconf/202133504006 fatcat:4trk7w3ujnbptgouvsyrzvduja

Intelligent Nutrition in Healthcare and Continuous Care

Rui Miranda, Diana Ferreira, Antonio Abelha, Jose Machado
2019 2019 International Conference in Engineering Applications (ICEA)  
Multiple challenges in representing the domain of food and the patient's needs make it complicated to implement these systems.  ...  , while elucidating new knowledge both for the institution and the scientific community.  ...  Fig. 2 . 2 System Architecture and Tools.  ... 
doi:10.1109/ceap.2019.8883496 fatcat:x734wdtutfcxnn5c7ktuv4gaja
« Previous Showing results 1 — 15 out of 13,771 results