A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Caprice: a tool for engineering adaptive privacy
2012
Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering - ASE 2012
This paper presents Caprice -a tool for enabling software engineers to design systems that discover and mitigate contextsensitive privacy threats. ...
To satisfy such changing requirements, there is a need for continuous analysis to discover new threats and possible mitigation actions. ...
to discover privacy threats, and (3) suggesting possible threat mitigation actions based on the severity of the discovered threat. ...
doi:10.1145/2351676.2351745
dblp:conf/kbse/OmoronyiaPSCDN12
fatcat:6uhmp3kzzfa7pdacgfkc5r345e
An adaptive distributed Intrusion detection system architecture using multi agents
2019
International Journal of Electrical and Computer Engineering (IJECE)
The major issues with these systems are the time taken for analysis, transfer of bulk data from one part of the network to another, high false positives and adaptability to the future threats. ...
Analysis and detection agents are the mobile agents which are the primary detection modules for detecting intrusions. Their mobility eliminates the transfer of bulk data for processing. ...
The system is capable of reacting to threats immediately by using the techniques such as packet discard, resetting the connection and alarming to the authorities. ...
doi:10.11591/ijece.v9i6.pp4951-4960
fatcat:sdu76exyfbgmbmrvvmo74nck2i
Adaptive security and privacy in smart grids: A software engineering vision
2012
2012 First International Workshop on Software Engineering Challenges for the Smart Grid (SE-SmartGrids)
These threats typically manifest themselves at runtime as new usage scenarios arise and vulnerabilities are discovered. ...
system controls and perhaps even changing requirements. ...
ACKNOWLEDGMENT This work was supported, in part, by Science Foundation Ireland grant 10/CE/I1855 to Lero -The Irish Software Engineering Research Centre (www.lero.ie). ...
doi:10.1109/se4sg.2012.6225718
dblp:conf/icse/SalehiePON12
fatcat:uii52ghpnjgqrnzzvzeylrwhdu
Smartphones and IoT Security
2019
Informatică economică
Mobile devices (smartphones or IoT devices) threats are all over and come in many ways. ...
This paper contains a classification for the threats and vulnerabilities for smartphones and tablets and a short one for IoT devices. ...
When we talk about any newly discovered incident that can harm a mobile device we talk about mobile security threats and when we talk about vulnerabilities we talk about some already known weakness of ...
doi:10.12948/issn14531305/23.2.2019.06
fatcat:hy42ubpq3fdglaclpiio7fqyju
"Network Sentiment" Framework to Improve Security and Privacy for Smart Home
2018
Future Internet
These two parts must cooperate and integrate their actions for reacting dynamically to new and on going threats. ...
The paper also presents a test bed for Smart Home to detect and counteract to different attacks against the IoT sensors, Wi-Fi and Ethernet connections. ...
A gateway architecture is chosen as the most appropriate for resource-constrained devices and for high system availability. ...
doi:10.3390/fi10120125
fatcat:iakkkuu5gzehhj6aowwjfuap5m
Security analysis of wireless mesh backhauls for mobile networks
2011
Journal of Network and Computer Applications
This article extends prior security threat analyses of 3rd generation mobile network architectures for the case of wireless mesh backhauls. ...
It presents a description of the security model for the considered architecture and provides a list of the basic assumptions, security objectives, assets to be protected and actors of the analysis. ...
This can be used to fingerprint the system and its sub systems, which is useful to discover a suitable attack vector. ...
doi:10.1016/j.jnca.2010.03.029
fatcat:kwf5arvtcrgthjwbrs54l4d2wu
Bio-inspired architecture for a reactive-deliberative robot controller
2014
2014 International Joint Conference on Neural Networks (IJCNN)
The architecture is composed of two layers where each layer is intended to react in an analogous way to how our brain reacts to external and internal stimuli, using instinctive or deliberative reactions ...
An incremental, bio-inspired control architecture for robots is proposed. ...
INTRODUCTION Our Central Nervous System (CNS) operates in a way that allow us to quickly react to threats and dangerous situations. ...
doi:10.1109/ijcnn.2014.6889813
dblp:conf/ijcnn/RubilarEA14
fatcat:qzac7cvvdnggpls4ctoiolsvh4
Predicting Terroristic Attacks in Urban Environments: An Internet-of-Things Approach
2014
International Journal of Security and Its Applications
We emphasize on the presentation of the architecture of the IoT system, including a sensor information collection layer, a database for storing terroristic-related ...
In this paper, we introduce a blueprint Internet-of-Things architecture for predicting terroristic attacks. ...
The authors acknowledge help and contributions from all partners of the project. ...
doi:10.14257/ijsia.2014.8.4.18
fatcat:vo3gom5txvcktm3qunx5y3tove
Context-Aware Ubiquitous Data Mining Based Agent Model for Intersection Safety
[chapter]
2005
Lecture Notes in Computer Science
for patterns of collisions and factors leading to a collision; (2) learn to recognize potential hazards in intersections from information communicated by road infrastructures, approaching and passing ...
This research aims to investigate an integration of intelligent software agents and ubiquitous data stream mining, for a novel context-aware framework that is able to: (1) monitor an intersection to learn ...
However, these projects do not mention the techniques to discover crash patterns and pre-crash behavior associations, which are essential to detecting and reacting to potential threats. ...
doi:10.1007/11596042_7
fatcat:skds2argqng4jmpdiyqwoxezyq
A Recent Analysis of Intrusion Detection and Prevention System for Protecting Range of Attack using Data Gathering Technique in MANET
2014
International Journal of Computer Applications
based on their architecture and data gathering techniques. ...
A Mobile Ad-hoc Network (MANET) is a mobile and multihop autonomous operation of wireless network. ...
Acknowledgments I am indebted to my (PhD) guide Mrs.A.Annalakshmi for giving me an insight on intrusion detection systems. ...
doi:10.5120/14859-3230
fatcat:fngee26phfeo7dmxbnu24mouli
An interoperable simulation framework for protecting port as critical infrastructures
2013
International Journal of System of Systems Engineering
Due to the complexity of the Port system including several actors and infrastructures, the operations coordination is critical in order to face new asymmetric threats; so interoperable simulation combined ...
Therefore the proposed framework is useful for the review, testing and certification of Ports Security Plans, Risk Assessments and Gaps Identification as well as for operators training. ...
crime To prevent and detect these threats it is necessary to focus on regulations and standards, organization and procedures and personnel training in order to proper react by taking into account (Fischer ...
doi:10.1504/ijsse.2013.057661
fatcat:zqpado2syjgw3f5io4awrreb5e
Analysis of Security methods in Internet of Things
2015
International Journal on Recent and Innovation Trends in Computing and Communication
Internet of Things (IoT) is a new revolution for the internet. IoT is to enable things to be connected anytime, anyplace, with anything and anyone ideally using any path/network and any service. ...
In this paper describes the analysis of security methods in the area of IoT and also describes a protocol which combines zero knowledge proof and key exchange algorithm to provide secure and authenticated ...
Mobile devices have the ability to monitor the neighbouring devices and report if any threats are detected. After detecting threats they can send warnings to those devices. ...
doi:10.17762/ijritcc2321-8169.150446
fatcat:cx7woa2b7jhwjgl2gxofbv5j7i
An Overview of Proactive Forensic Solutions and its Applicability to 5G
2018
2018 IEEE 5G World Forum (5GWF)
In addition, the requirements for deploying proactive forensic solutions in 5G are classified, and analysed based on the specific threats against 5G. ...
This article analyses the state of the art of proactive forensic solutions and highlights the importance of preparing the 5G ecosystem to serve digital forensic purposes. ...
The author has been financed by INCIBE through the grant program for excellency in advanced cybersecurity research teams. ...
doi:10.1109/5gwf.2018.8516940
dblp:conf/5gwf/Nieto18
fatcat:7hvwa47nxfg7xd7y72v477gkzu
Feast In: A Machine Learning Image Recognition Model of Recipe and Lifestyle Applications
2021
MATEC Web of Conferences
In this paper, we propose Feast In, a platform for web and mobile devices which aims to meet a user's needs for home-cooking. ...
By conducting this research, we were able to propose a unique lifestyle and recipe application which would aid users in searching for the perfect recipe. ...
Besides that, the author would like to acknowledge their supervisors, Dr. Goh Wei Wei and Mr Khor Chun Hee for guiding throughout the project. ...
doi:10.1051/matecconf/202133504006
fatcat:4trk7w3ujnbptgouvsyrzvduja
Intelligent Nutrition in Healthcare and Continuous Care
2019
2019 International Conference in Engineering Applications (ICEA)
Multiple challenges in representing the domain of food and the patient's needs make it complicated to implement these systems. ...
, while elucidating new knowledge both for the institution and the scientific community. ...
Fig. 2 . 2 System Architecture and Tools. ...
doi:10.1109/ceap.2019.8883496
fatcat:x734wdtutfcxnn5c7ktuv4gaja
« Previous
Showing results 1 — 15 out of 13,771 results