7,048 Hits in 7.2 sec

An Intelligent Communication Warning Vulnerability Detection Algorithm Based on IoT Technology

Mao Yi, Xiaohui Xu, Lei Xu
2019 IEEE Access  
A static detection method for early warning vulnerabilities based on the counter-example of the IoT is proposed.  ...  Firstly, it uses the attack graph technology to establish a network security evaluation model based on the vulnerability association analysis in the IoT environment.  ...  is low. 2) Impact on operating system type (OS Type) The basic evaluation, the new evaluation and the environmental evaluation are respectively scored.  ... 
doi:10.1109/access.2019.2953075 fatcat:3orqu5nisjhudhjtrmzmeig36q

An Integrated Wind Risk Warning Model for Urban Rail Transport in Shanghai, China

Han, Tan, Grimmond, Ma, Yang, Weng
2020 Atmosphere  
The integrated wind risk warning model for rail transport presented has four elements: Background wind data, a wind field model, a vulnerability model, and a risk model.  ...  In the risk model, the maximum value of three aerodynamic forces is used as the criteria to evaluate rail safety and to quantify the risk level under extremely windy weather.  ...  Acknowledgments: We thank all the anonymous reviewers for their fair, exhaustive and competent comments on the manuscript. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/atmos11010053 fatcat:pdv3swkcavgmlmvnho6fzfdecm

Evaluation of Distributed Intelligence on the Smart Card [article]

Kazuo J. Ezawa, Greg Napiorkowski, Mariusz Kossarski
2013 arXiv   pre-print
We describe challenges in the risk management of smart card based electronic cash industry and describe a method to evaluate the effectiveness of distributed intelligence on the smart card.  ...  More specifically, we discuss the evaluation of distributed intelligence function called "on-chip risk management" of the smart card for the global electronic cash payment application using micro dynamic  ...  When there is a attack, it causes a large number of merchants to be in the out of norm condition (red stars) that normal, and it gives us warning of potential counterfeit activities.Overall, both systems  ... 
arXiv:1301.6693v1 fatcat:nsieijdeb5gm7orek3zthg6bpi

Middleware-Based Security and Privacy for In-car Integration of Third-Party Applications [chapter]

Alexandre Bouard, Maximilian Graf, Dennis Burgkhardt
2013 IFIP Advances in Information and Communication Technology  
Our approach proposes an on-board integration of several local and distributed security mechanisms: i) a security communication proxy on the edge of the on-board network, which filters inbound and outbound  ...  Their combination allows a secure tethering of external communication partners with internal functionalities, e.g., original on-board functions, developed by the car manufacturer, or third-party (TP) applications  ...  Instead of directly qualifying the privacy aspect of an information, we chose to focus on the trust we grant an external receiving peer and to quantify that.  ... 
doi:10.1007/978-3-642-38323-6_2 fatcat:ayqxwauitjc6nh4pxzxey7nwhm

Analysis of Cybersecurity Issues in the Maritime Industry

Boyan Mednikarov, Yuliyan Tsonev, Andon Lazarov
2020 Information & Security An International Journal  
A B S T R A C T : The maritime industry with its main components-port logistics, ships, cargo and container distribution systems, autonomous control and navigation systems, global identification and navigation  ...  systems-is a substantial and plausible target of cyberattacks.  ...  For this purpose, a penetration detection system and a system for the prevention of external interference in the network are used as the main functions of the firewall.  ... 
doi:10.11610/isij.4702 fatcat:4hoinhh7jbb6vmqbvybqbh5yd4

A review on key challenges in intelligent vehicles: Safety and driver‐oriented features

Lin Hu,, Xiqin Zhou, Xin Zhang,, Fang Wang, Qiqi Li, Wenguang Wu
2021 IET Intelligent Transport Systems  
IVs have made significant progress in recent years, but it is still face great challenges in order to be accepted by users on a large scale.  ...  The authors sort out the key technologies and challenges of the basic architecture of IVs, and propose existing attack and defences strategies for IVs information security technology.  ...  [11] divided the types of attacks into denial of service attacks, distributed denial of service attacks, black hole attacks, reply attacks, Sybil attacks, Impersonation attacks, malware, falsified-information  ... 
doi:10.1049/itr2.12088 fatcat:4r2tbv2emzdxdjv2q7waednmdi

Security Compliance Tracking of Processes in Networked Cooperating Systems

Roland Rieke, Maria Zhdanova, Jürgen Repp
2015 Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications  
We demonstrate the implementation of the proposed approach on a critical infrastructure scenario from a European research project.  ...  At that, operational models are utilized for: (a) tracking conformance of process behavior with respect to the specification, (b) detection of behavior anomalies which indicate possible attacks, (c) tracking  ...  Acknowledgments The presented work was developed in context of the project ACCEPT (ID 01BY1206D) being funded by the German Federal Ministry of Education and Research and the project MASSIF (ID 257475)  ... 
doi:10.22667/jowua.2015.06.31.021 dblp:journals/jowua/RiekeZR15 fatcat:s32id56dpzhcvhswle4dlslism

Analyzing inter-application communication in Android

Erika Chin, Adrienne Porter Felt, Kate Greenwood, David Wagner
2011 Proceedings of the 9th international conference on Mobile systems, applications, and services - MobiSys '11  
We analyzed 20 applications with the help of ComDroid and found 34 exploitable vulnerabilities; 12 of the 20 applications have at least one vulnerability.  ...  In addition to an open API, the Android operating system also provides a rich inter-application message passing system.  ...  Any opinions, findings, conclusions, or recommendations expressed in this publication are those of the authors and do not necessarily reflect the views of the National Science Foundation.  ... 
doi:10.1145/1999995.2000018 dblp:conf/mobisys/ChinFGW11 fatcat:eildcftygra2lidwpeol7vhxr4

A taxonomy of cyber attack and defence mechanisms for emergency management networks

George Loukas, Diane Gan, Tuan Vuong
2013 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)  
A cyber attack could cause such network failures intentionally, so as to impede the work of first responders and maximise the impact of a physical emergency.  ...  Emergency management is increasingly dependent on networks for information gathering, coordination and physical system control, and consequently is increasingly vulnerable to network failures.  ...  As a result, a security breach in one network can have an impact on the rest and ultimately on the success of an EM operation.  ... 
doi:10.1109/percomw.2013.6529554 dblp:conf/percom/LoukasGV13 fatcat:rhngyawgkrdhpajxgl3iow6ctm

Intelligent Disaster Response via Social Media Analysis - A Survey [article]

Tahora H. Nazer, Guoliang Xue, Yusheng Ji, Huan Liu
2017 arXiv   pre-print
The success of a disaster relief and response process is largely dependent on timely and accurate information regarding the status of the disaster, the surrounding environment, and the affected people.  ...  In this survey, we review the new frontier of intelligent disaster relief and response using social media, show stages of disasters which are reflected on social media, establish a connection between proposed  ...  Ushahidi is an open source and free systems which can either be deployed on external servers or on Ushahidi's hosting system CrowdMap.  ... 
arXiv:1709.02426v1 fatcat:pc2vmo3h6rem5hxwmq4d7d6mdq

Are pilots prepared for a cyber-attack? A human factors approach to the experimental evaluation of pilots' behavior

Patrick Gontar, Hendrik Homans, Michelle Rostalski, Julia Behrend, Frédéric Dehais, Klaus Bengler
2018 Journal of Air Transport Management  
Further, pilots who experienced an attack monitored basic flying instruments less and their performance deteriorated. A warning about a potential attack seems to moderate several of those effects.  ...  Pilots experiencing an attack report heavier workload and weakened trust in the system than pilots whose aircraft is not under attack.  ...  We thank Immanuel Barshi for fruitful discussions about and comments on earlier versions of the manuscript.  ... 
doi:10.1016/j.jairtraman.2018.01.004 fatcat:6jqgxteuf5ekrhbvlyg7xbns3a

The Cyber-MAR Project: First Results and Perspectives on the Use of Hybrid Cyber Ranges for Port Cyber Risk Assessment

Olivier Jacq, Pablo Gimenez Salazar, Kamban Parasuraman, Jarkko Kuusijarvi, Andriana Gkaniatsou, Evangelia Latsa, Angelos Amditis
2021 Zenodo  
Over the last few years, there has been a significant increase in the number of disclosed cyber-attacks on ports.  ...  By describing a specific port use-case and the first results achieved, we draw perspectives for the use of cyber ranges for the training of port actors in cyber crisis management.  ...  The authors would like to thank all participants of the Cyber-MAR H2020 project for their continuous and rich involvement in the specification and realization of this port CR use-case.  ... 
doi:10.5281/zenodo.5236127 fatcat:uusnycw4ovfuta4zmrtbm7bhy4

A Survey: Recent Advances and Future Trends in Honeypot Research

Matthew L. Bringer, Christopher A. Chelmecki, Hiroshi Fujinoki
2012 International Journal of Computer Network and Information Security  
This paper presents a survey on recent advances in honeypot research from a review of 80+ papers on honeypots and related topics mostly published after year 2005.  ...  detections by attackers, and  legal and ethical issues in using honeypots.  ...  If the threat warning is validated by the dynamic forensic system, the traffic is automatically redirected to the honeypot.  ... 
doi:10.5815/ijcnis.2012.10.07 fatcat:dlidikdrxfavhirshxm37avygq

SleepGuardian: An RF-based Healthcare System Guarding Your Sleep from Afar [article]

Yu Gu and Yantong Wang and Zhi Liu and Jun Liu and Jie Li
2019 arXiv   pre-print
Once an abnormality happens,it will automatically warn the designated contacts like a nearby emergency room or a closeby relative.We prototype SleepGuardian with low-cost WiFi devices and evaluate it in  ...  Based on the analysis, we present SleepGuardian, a Radio Frequence (RF) based sleep healthcare system leveraging signal processing, edge computing and machine learning.SleepGuardian offers an offline sleep  ...  ACKNOWLEDGMENTS The authors would like to thank the anonymous reviewers for their time and effort.  ... 
arXiv:1908.06171v1 fatcat:gdjba2blxjd53hd2uxhtadn5ca

Connected Car: Quantified Self becomes Quantified Car

Melanie Swan
2015 Journal of Sensor and Actuator Networks  
The automotive industry could be facing a situation of profound change and opportunity in the coming decades.  ...  The connected car means that vehicles are now part of the connected world, continuously Internet-connected, generating and transmitting data, which on the one hand can be helpfully integrated into applications  ...  On-board sensor systems could automatically assess the impact of a crash and predict human injury and property damage.  ... 
doi:10.3390/jsan4010002 fatcat:oj2xr24bmjgt3nyqjbabyucpma
« Previous Showing results 1 — 15 out of 7,048 results