Browsing by Subject "Security"
Now showing items 1-18 of 18
-
Agent-based modeling framework for adaptive cyber defence of the Internet of Things
(2022-12-01)The adoption of the Internet of Things (IoT) continues to increase significantly, introducing unique challenges and threats to cybersecurity. In parallel, adaptive and autonomous cyber defence has become an emerging research ... -
An analysis of face matching accuracy and related variables: a meta-analysis and two follow-up studies
(2022-07-01)Face matching is used in many different transportation and policing situations and is an important last line of defense in security contexts such as the TSA. Despite how important this task is in ensuring security, no ... -
An anomaly detection model utilizing attributes of low powered networks, IEEE 802.15.4e/TSCH and machine learning methods
(2019-12-01)The rapid growth in sensors, low-power integrated circuits, and wireless communication standards has enabled a new generation of applications based on ultra-low powered wireless sensor networks. These are employed in many ... -
Claims-aware middleware for securing IoT services
(2016-04-01)Take a look at the world around us. There has been tremendous change in the way of living. With the world around us getting smart, Internet of Things is gaining ground in our life. Applications like smart home and eHealth ... -
Design and implementation of the crypto-assistant: an eclipse plugin for usable password-based column level encryption based on hiberate and jasypt
(2013-03-01)The lack of encryption of data at rest or in motion is one of the top 10 database vulnerabilities according to team SHATTER [72]. In the quest to improve the security landscape, we identify an opportunity area: two tools ... -
Design of a secure privacy preserving cloud based framework for sharing electronic health data
(2020-01-01)There exists a need for sharing user health data, especially with institutes for research purposes, in a secure fashion. This is especially true in the case of a system that includes a third party storage service, such as ... -
Determining the effectiveness of nuclear security through computer simulation
(2015-09-01)There is a growing concern from both national regulators and the International Atomic Energy Agency (IAEA) about the threat posed by attacks against iconic targets such as nuclear power plants. This has led to an increased ... -
A framework for privacy-preserving data sharing in smart grid
(2016-01-01)While smart grid introduces a lot of enhancements to the traditional power grid and improves managing and controlling consumers demands, it also introduces security and privacy issues. Therefore, failure to address them ... -
An investigation of semantic patterns in passwords
(2013-08-01)The advent of large password leaks in recent years has exposed the security problems of passwords and enabled deeper empirical investigation of password patterns. Researchers have only touched the surface of patterns in ... -
Matching expectations and reality in AI systems - cybersecurity use case
(2023-04-01)Artificial intelligence (AI) is a growing field in computer science which develops intelligent systems capable of performing things that a human mind can do. The manufacturers of security systems integrate AI capabilities ... -
A privacy preservation framework for smart connected toys
(2019-09-01)Advances within the toy industry and interconnectedness have resulted in the rapid and pervasive development of Smart Connected Toys (SCTs), built to aid children in learning, socialization, and development. A SCT is a ... -
Secure and compromise-resilient architecture for advanced metering infrastructure
(2011-03-01)In recent years, the Smart Grid has grown to be the solution for future electrical energy that promises to avoid blackouts as well as to be energy efficient, environmentally and customer-friendly. In Smart Grid, the ... -
Secure and privacy-preserving fog-assisted vehicular crowdsensing
(2018-08-01)Vehicular crowdsensing (VCS) is an emerging paradigm where vehicles use onboard sensors to collect and share data with the aim of measuring phenomena of common interest. VCS has allowed for automated control as well as ... -
Social-based trustworthy data forwarding in vehicular delay tolerant networks
(2011-03-01)Vehicular ad hoc network (VANET) is an emerging new communication technol-ogy which has attracted a lot of research attention from academic community and indus-try. For many applications in VANETs, information has to be ... -
Strategies and applications for creating more memorable passwords
(2016-01-01)As we continue to learn and grow in an ever evolving technological age, we deepen our understanding of the importance of authentication. There are many different types of authentication, each exhibiting their own strengths ... -
Towards a computational model of information trust
(2022-02-01)Information has been an essential element in the development of collaborative and cooperative frameworks. From decision making to the attainment of different goals, people have been relatively adept at making judgments ... -
Towards secure and privacy preserving e-health data exchanges through consent based access control
(2017-09-01)How we administer healthcare continues to evolve alongside the advancement of information technology. As we become more connected, the Internet of Things and our want to share information in a timely manner encourage us ... -
Virtual machine detection through Central Processing Unit (CPU) detail anomalies
(2022-12-01)Malware analysts commonly use virtual machines to provide safe environments to study malware. Malware authors in response, include virtual machine detection functions in their malware so it changes its behavior should a ...