the growth of the Internet of things (IoT) has recently seen an exponentially rise withthe number of IoT devices been connectedincreasing in billions, but with such rapid demand and growth, IoT still faces few issues...
详细信息
the 18th Workshop on privacy in the Electronic Society (WPES 2019) was held on November 11th, 2019, in conjunction withthe 26thacmconference on Computer and Communications security (CCS 2019) in London, United King...
详细信息
ISBN:
(纸本)9781450367479
the 18th Workshop on privacy in the Electronic Society (WPES 2019) was held on November 11th, 2019, in conjunction withthe 26thacmconference on Computer and Communications security (CCS 2019) in London, United Kingdom. the goal of WPES is to bring together privacy researchers and practitioners to discuss the privacy problems that arise in an interconnected society and solutions to those problems. the program for the workshop contains 14 full papers and 5 short papers selected from a total of 67 submissions. Specific topics covered in the program include secure computation, secure communication, mobile-device privacy, genomic dataprivacy, social aspects of privacy, data anonymization, and privacy-enhancing techniques for the Internet of things, blockchain and Web.
A large number of images are generated and uploaded to the cloud, due to the rapid development of IT and networking technologies. To prevent unauthorized access, image encryption is a way that can ensure the safety of...
详细信息
Wireless Sensor Networks (WSNs) consist mainly of resource constrained sensor nodes and gateways. therefore, various lightweight communication protocols are emerging for Machine to Machine (M2M) communications. Among ...
详细信息
ISBN:
(纸本)9781728191805
Wireless Sensor Networks (WSNs) consist mainly of resource constrained sensor nodes and gateways. therefore, various lightweight communication protocols are emerging for Machine to Machine (M2M) communications. Among the various application layer protocols for data communication in WSNs, the two most popular protocols for constrained devices are the Message Queue Telemetry Transport Protocol (MQTT) with a variant for sensor nodes (MQTT-SN) and the Constrained application Protocol (CoAP). Studies have shown that the performance of these different protocols are dependent on different network conditions. CoAP is more efficient in terms of message overhead and MQTT-SN is more efficient in terms of client complexity. Studies have further emphasized the levels of difficulties to implementing any of these protocols with regard to application requirements. In this paper we propose a hybrid MQTT-CoAP protocol technique using an abstraction layer that enables both MQTT-SN and CoAP protocol to be used in the sensor node. Performance evaluation of these protocols under the hybrid technique shows that the hybrid is feasible and while CoAP performs better in terms of energy consumption, the two protocols perform almost equally in latency. the observed values of latency and energy consumption in the developed hybrid technique was comparable to other studies.
the proceedings contain 251 papers. the topics discussed include: honey encryption based hybrid cryptographic algorithm: a fusion ensuring enhanced security;face recognition system using machine learning algorithm;pre...
ISBN:
(纸本)9781728153711
the proceedings contain 251 papers. the topics discussed include: honey encryption based hybrid cryptographic algorithm: a fusion ensuring enhanced security;face recognition system using machine learning algorithm;predicting clinical re-admission using discharge summaries (PCRUDS);dementia detection using machine learning by stacking models;fuzzy logic based charging of electric vehicles for load management of microgrid;virtual mouse using object tracking;deep learning based surgical workflow recognition from laparoscopic videos;classification algorithms based mental health prediction using data mining;analysis and application of zigzag transformer in distribution system for mitigation of triplen harmonics;prioritization of parts of a medical equipment using analytical hierarchy process;and voice controlled personal assistant robot for elderly people.
the proceedings contain 38 papers. the topics discussed include: building privacy-preserving cryptographic credentials from federated online identities;Neuralyzer: flexible expiration times for the revocation of onlin...
ISBN:
(纸本)9781450339353
the proceedings contain 38 papers. the topics discussed include: building privacy-preserving cryptographic credentials from federated online identities;Neuralyzer: flexible expiration times for the revocation of online data;HCFi: hardware-enforced control-flow integrity;derandomizing kernel address space layout for memory introspection and forensics;patching logic vulnerabilities for web applications using LogicPatcher;to fear or not to fear that is the question: code characteristics of a vulnerable function with an existing exploit;on the effectiveness of sensor-enhanced keystroke dynamics against statistical attacks;on the feasibility of cryptography for a wireless insulin pump system;SPICE: a software tool for bridging the gap between end-user's insecure cyber behavior and personality traits;automatic summarization of privacy policies using ensemble learning;and evaluating analysis tools for android apps: status quo and robustness against obfuscation.
Machine Learning (ML) has become one of the dominant technologies in the research world. It is being applied without exception in every field where automation and future predictions are required such as cyber security...
详细信息
Supervisory Control and data Acquisition (SCADA) networks, which enable virtual components of critical infrastructures to connect to physical components, like the electrical grid, for example, are susceptible to cyber...
详细信息
ISBN:
(纸本)9789897584268
Supervisory Control and data Acquisition (SCADA) networks, which enable virtual components of critical infrastructures to connect to physical components, like the electrical grid, for example, are susceptible to cyber threats. this introductory paper discusses the application of deception as a technique for improving the cybersecurity posture of a network by using decoys to obfuscate the network and in turn make it harder for a potential adversary to find the real components. the Decepti-SCADA framework is introduced, which demonstrates multiple improvements over previous implementations of cyber deception strategies for SCADA systems. Decepti-SCADA has developed SCADA-specific decoys that can be used in a critical infrastructure environment. We detail Decepti-SCADA's architecture, decoy generation and distribution, and ultimately explore what else can be done with cyber deception for critical infrastructures through early results.
Currently, to perform a certain task (for example, a search operation), unmanned aerial vehicles have been combined into an organized group, which can be called a swarm. Naturally, such an information system is of int...
详细信息
In order to improve the efficiency of emergency management and decision-making and command of infectious diseases, infectious disease early warning technologies and systems can be used to monitor the trend of abnormal...
详细信息
ISBN:
(纸本)9781728180229
In order to improve the efficiency of emergency management and decision-making and command of infectious diseases, infectious disease early warning technologies and systems can be used to monitor the trend of abnormal outbreaks and provide timely and accurate warnings. However, the current infectious disease early warning system still has problems such as insufficient intelligence, poor circulation of key information, and difficulty in distributed collaborative decision-making. Based on the blockchain distributed computing architecture, combined with emerging information technologies such as artificial intelligence, big data, and smart contracts, an infectious disease monitoring and early warning technology and its implementation framework are proposed. the technology can efficiently concentrate multi-party monitoring forces, flexibly integrate multiple early warning methods, build a knowledge integration and smart interconnected distributed collaborative monitoring environment under the premise of security and privacy protection, and use smart contracts as open, fair, software-defined monitoring the agent integrates decision-making, monitoring infectious diseases and automatic early warning in real time, so as to take into account the requirements of early warning accuracy and timeliness, and avoid isolated evidence and decision bias.
暂无评论