354 Hits in 9.8 sec

User, Usage and Usability: Redefining Human Centric Cyber Security

Marthie Grobler, Raj Gaire, Surya Nepal
2021 Frontiers in Big Data  
We explore the increasing complexity of cyber security with a wider perspective, defining user, usage and usability (3U's) as three essential components for cyber security consideration, and classify developmental  ...  The aim of this survey is to provide both users and system designers with insights into the workings and applications of human centric cyber security.  ...  The shift from a pure focus on usage toward a consideration for human behavior is a strong move toward human centric cyber security, and will contribute to better usage and usability of the systems.  ... 
doi:10.3389/fdata.2021.583723 pmid:33748750 pmcid:PMC7968726 fatcat:y4aztmzsfjbzpfpiroomhmuhjm

Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber–physical convergence

Marco Conti, Sajal K. Das, Chatschik Bisdikian, Mohan Kumar, Lionel M. Ni, Andrea Passarella, George Roussos, Gerhard Tröster, Gene Tsudik, Franco Zambonelli
2012 Pervasive and Mobile Computing  
Information flows from the physical to the cyber world, and vice-versa, adapting the converged world to human behavior and social dynamics.  ...  The physical environment is becoming more and more saturated with computing and communication entities that interact among themselves, as well as with users: virtually everything will be enabled to source  ...  , and quality of information (contextual or otherwise).  ... 
doi:10.1016/j.pmcj.2011.10.001 fatcat:xgqhx3xumnboflg72vhoe4sbui

Augmenting Mobile Cloud Computing through Enterprise Architecture: A Survey Paper

Khair Muhammad, M. N. A Khan
2015 International Journal of Grid and Distributed Computing  
The rest of the paper is organized as follows: Section II describes an overview of the related work pertaining to the security issues, application architecture, trust models and data security frameworks  ...  In this paper, we have looked into the usage of mobility through the power of cloud computing for corporate sector. A critical review and gap analysis between existence models is also provided.  ...  User-centric application scenario is discussed as proof-of-concept.  ... 
doi:10.14257/ijgdc.2015.8.3.30 fatcat:7ta4ua265reehpanh72fwmfovi

Major requirements for building Smart Homes in Smart Cities based on Internet of Things technologies

Terence K.L. Hui, R. Simon Sherratt, Daniel Díaz Sánchez
2017 Future generations computer systems  
The recent boom in the Internet of Things (IoT) will turn Smart Cities and Smart Homes (SH) from hype to reality.  ...  Seven unique requirement recommendations are defined and classified according to the specific quality of the SH building blocks.  ...  User Interfaces tailor-made for intelligent homes are critical in a Human-centric technology like SH.  ... 
doi:10.1016/j.future.2016.10.026 fatcat:pyoiacst75hsxj7te3h2ucrq2q

Inclusion Through the Internet of Things [chapter]

Louis Coetzee, Guillaume Olivri
2012 Assistive Technologies  
education, mobility, communication and social interactivity, among others.  ...  pages Publisher InTech This book offers the reader new achievements within the Assistive Technology field made by worldwide experts, covering aspects such as assistive technology focused on teaching and  ...  The authors acknowledge the contributions and inputs from the team members from the Ability Based Technology Interventions, National Accessibility Portal and Enabling Environments CSIR Meraka research  ... 
doi:10.5772/31929 fatcat:yf7ijom4ivgrto7olvvsd5x3eq

GenAtSeq GAN with Heuristic Reforms for Knowledge Centric Network with Browsing Characteristics Learning, Individual Tracking and Malware Detection with Website2Vec

Chiranjib Sur
2020 SN Computer Science  
Identification of individuals through the use of electronic footprints can be a security vulnerability and also a blessing in disguise.  ...  malware, and other browser-based phishing software activity detection.  ...  unknowingly or as a result of the normal usage behavior of humans, getting used to working patterns.  ... 
doi:10.1007/s42979-020-00234-8 fatcat:tyowypduvrczrpieyhh2wycsau

Web Authentication: no Password; Listen and Touch

Viorel LUPU
2019 Advances in Science, Technology and Engineering Systems  
Web services users are still required to use many combinations of usernames and passwords.  ...  This work is an extension of the paper entitled "Securing Web Accounts by Graphical Password and Voice Notification" published in 2018 IEEE International Conference on Engineering, Technology and Innovation  ...  Introduction Any authentication service must be designed, built and operated on a basis of user centric vison [1] .  ... 
doi:10.25046/aj040109 fatcat:bb3gouu4avcfbevotmqqzsbqk4

Conceptualization and cases of study on cyber operations against the sustainability of the tactical edge [article]

Marco Antonio Sotelo Monge, Jorge Maestre Vidal
2021 arXiv   pre-print
Although there is a plethora of well documented cases on strategic and operational interventions of cyber commands, the cyber tactical military edge is still a challenge, where cyber fires barely integrate  ...  impact of TDoS attacks; 4) emphasizes the related human and socio-technical aspects; 5) analyzes the threats/opportunities inherent to their impact on the cloud energy efficiency; 6) reviews their implications  ...  [43] , and against responding presents a high dependency of the acquisition of a mission-centric cyber situational awareness [78] .  ... 
arXiv:2101.08676v1 fatcat:y76tm3syjjgzrkmlhgdh6h3kre

Smart Sovereignty: The Security Shield for Smart Society 5.0

Mohammad Aldabbas, Stephanie Teufel, Bernd Teufel, Virgile Pasquier
2020 International Journal for Digital Society (IJDS)  
Transformation of human societies is inevitable. Soon humanity will witness Society 5.0. The Super Smart Society is pushed and charged with technological growth and revolutions.  ...  This new concept opens the doors for a vast research field that touches our security directly.  ...  Public manipulation Security of data and cyber security Unemployment Digital trust and E-vot- ing Cyber bullying Digital rights Copyright © 2020, Infonomics Society International Journal  ... 
doi:10.20533/ijds.2040.2570.2020.0202 fatcat:b5h3k7vyrfbnnp4jx7wgwmr2gi

D8.1 – Evaluation plan

ASSIST-IoT Consortium
2022 Zenodo  
Application and Services Plane KPIs related to Application and Services plane, which supports and provides human-centric enablers for administrative and end-user applications and services.  ...  (more concretely: distributed smart networking components, decentralized security and privacy exploiting DLT, smart distributed AI enablers, human-centric tools, and interfaces).  ...  usage in the future.  ... 
doi:10.5281/zenodo.6777481 fatcat:petwo7hlqjebxbhhwfgcpvwjyi

6G Enabled Industrial Internet of Everything: Towards a Theoretical Framework

Prafulla Kumar Padhi, Feranando Charrua-Santos
2021 Applied System Innovation  
The potential of IoE is enormous and growing exponentially.  ...  With the dawn of the fifth industrial revolution, IoE is transposing into industrial Internet of Everything (IIoE) projects which are complex and are eventuating to become a prominent technology for all  ...  Acknowledgments: The authors would like to greatly thank Fundação para a Ciência e Tecnologia (FCT) and C-MAST (Center for Mechanical and Aerospace Science and Technologies), under project UIDB/00151/2020  ... 
doi:10.3390/asi4010011 fatcat:jeiko2cywvglnecglwjrwwxgnu

Decentralized transactive energy community in edge grid with positive buildings and interactive electric vehicles

Ying Wu, Yanpeng Wu, Josep M. Guerrero, Juan C. Vasquez
2022 International Journal of Electrical Power & Energy Systems  
physical space, data cyber space, and human social space.  ...  However, according to CarbonBrief analysis, energy usage, air pollution levels, and carbon  ...  and also cyber security issues.  ... 
doi:10.1016/j.ijepes.2021.107510 fatcat:4u65l6hyu5hnbgjnvfccr64xoa

Internet of Things 2.0: Concepts, Applications, and Future Directions

Ian Zhou, Imran Makhdoom, Negin Shariati, Muhammad Ahmad Raza, Rasool Keshavarz, Justin Lipman, Mehran Abolhasan, Abbas Jamalipour
2021 IEEE Access  
Therefore, revealing the common properties of Tactile Internet, IoT and 5G as low latency, ultra-high availability, Human to Human (H2H)/M2M co-existence, data-centric technologies and security.  ...  rogue devices. 4) IoT device security and user data security and privacy. 5) Non-availability of IoT-centric access control and intrusion detection system to avoid insider and external attacks. 6) Key  ... 
doi:10.1109/access.2021.3078549 fatcat:g5jkc5p6tngpfonbhtsbcjipai

Aspecte intrinseci ale consolidării e-Guvernării la nivelul Uniunii Europene. Studiu de caz: România

Andreea Florina RADU, Ioana PETCU
2021 Revista Română de Informatică și Automatică  
EU level, based on a brief mapping of the measures taken so far and the stage of elaboration and implementation of e-government solutions throughout Europe and in subsidiary, in Romania.  ...  The article presents the characteristics of e-Government as a tool to improve the interaction between the government and the citizens, as well as with the business environment and even with the administrative  ...  Technology that works for the people (investing in digital skills of EU citizens; protecting people from cyber threats to personal and sensitive data; developing a "human-centric" AI; expanding the ultra-rapid  ... 
doi:10.33436/v31i4y202107 fatcat:dkqjgjjuc5du7chcmuhuqfnxea

A Review on Internet of Things for Defense and Public Safety

Paula Fraga-Lamas, Tiago Fernández-Caramés, Manuel Suárez-Albela, Luis Castedo, Miguel González-López
2016 Sensors  
and increasing operation efficiency and effectiveness.  ...  This article reviews the main tactical requirements and the architecture, examining gaps and shortcomings in existing IoT systems across the military field and mission-critical scenarios.  ...  oriented: the invisible IoT, things-to-Humans collaboration, IoT 4 All and User-centric IoT • Quality of Information and IoT service reliability • Highly distributed IoT processes • Semi-automatic process  ... 
doi:10.3390/s16101644 pmid:27782052 pmcid:PMC5087432 fatcat:vg4ybtb7qjfj3iuhnocr7pkdoa
« Previous Showing results 1 — 15 out of 354 results