作者:
Bakr, Hend A.Salama, Ahmed M.Fares, AhmedZaky, Ahmed B.Cairo University
Biomedical Engineering Program Faculty of Engineering Giza Egypt Benha University
Computer Systems Engineering Program Faculty of Engineering at Shoubra Banha Egypt
Computer science and information technology Programs Alexandria Egypt Benha University
On leave from Computer Systems Engineering Program Faculty of Engineering at Shoubra Egypt
Physician scheduling is a critical task that impacts the quality of patient care, staff satisfaction, and operational efficiency in healthcare institutions. The traditional approach to physician scheduling is manual a...
详细信息
The deep integration of IoT into our daily lives has made the security of IoT everyone's priority, from IoT device manufacturers to IoT developers and final customers. Even though every year millions of IoT device...
详细信息
ISBN:
(纸本)9798350369328
The deep integration of IoT into our daily lives has made the security of IoT everyone's priority, from IoT device manufacturers to IoT developers and final customers. Even though every year millions of IoT devices are introduced to the market, security, and privacy have not been competently addressed. Based on the survey of IoT challenges, IoT applications face many threats in Network communication, storage access, device identification and Authentication, program execution, firmware update, Secure Boot, etc. IoT devices are vulnerable to attacks, which breach the security and privacy of users and systems. Commonly most IoT applications are deployed using common operating systems that do not address IoT specialized security requirements. This paper introduces xPython, a novel secure-by-design operating system for IoT subsystems (devices and gateways). xPython provides transparent security solutions for common threats in addition to a security library for custom security implementation. xPython minimizes the time required to develop security features. xPython is secure by design to ensure security features are included at all stages of product creation and deployment. This paper proposes a new architecture for IoT operating systems, and it ends with a complete prototype implementation. The proposed architecture integrates security services inside operating system layers. It affects device initiation, communication protocols, application deployment, and application execution, ensuring software is executed securely, including non-secure applications (secure boot) and storage access. The proposed security solutions are inspired by previous work in Smart Cards. Smart Cards are considered a trusted environment for identification, authentication, and confidentiality. Finally, xPython is built over a real-time operating system to fulfill embedded systems requirements. The xPython development is also performed using Micro-Python to simplify the development process and reduc
Physician scheduling is a critical task that impacts the quality of patient care, staff satisfaction, and operational efficiency in healthcare institutions. The traditional approach to physician scheduling is manual a...
Physician scheduling is a critical task that impacts the quality of patient care, staff satisfaction, and operational efficiency in healthcare institutions. The traditional approach to physician scheduling is manual and time-consuming, which can result in errors, staff burnout, and suboptimal schedules. To address these challenges, researchers have turned to optimization techniques like CSP, which has shown promise in solving physician scheduling problems. This paper reviews the existing literature on CSP for physician scheduling and highlights the benefits and limitations of this approach. CSP's benefits include generating schedules quickly and efficiently, incorporating complex constraints and preferences, and handling changes and disruptions in real time. However, CSP also has some limitations, such as the need for a formalized model and the fact that it may not always generate the most intuitive schedules. Overall, the findings suggest that CSP is a promising approach to physician scheduling that can produce high-quality schedules while minimizing staff burnout and improving operational efficiency.
Nowadays cyber threats become increasingly sophisticated and prevalent. Intrusion Detection systems (IDS) have been widely used, to achieve the necessary security requirements in computer networks because of their abi...
Nowadays cyber threats become increasingly sophisticated and prevalent. Intrusion Detection systems (IDS) have been widely used, to achieve the necessary security requirements in computer networks because of their ability to detect network attacks. Recently, utilizing machine learning (ML) and deep learning (DL) models in IDS have demonstrated substantial improvements in identifying unknown attacks. This study conducts a comprehensive analysis of DL approaches for intrusion detection focusing on the recent research in the last five years, and explores the most used datasets in the field to highlight their characteristics and suitability for evaluating IDS performance. Finally, we present insights into the limitations, strengths, and future prospects of DL based IDS.
The deep integration of IoT into our daily lives has made the security of IoT everyone's priority, from IoT device manufacturers to IoT developers and final customers. Even though every year millions of IoT device...
The deep integration of IoT into our daily lives has made the security of IoT everyone's priority, from IoT device manufacturers to IoT developers and final customers. Even though every year millions of IoT devices are introduced to the market, security, and privacy have not been competently addressed. Based on the survey of IoT challenges, IoT applications face many threats in Network communication, storage access, device identification and Authentication, program execution, firmware update, Secure Boot, etc. IoT devices are vulnerable to attacks, which breach the security and privacy of users and systems. Commonly most IoT applications are deployed using common operating systems that do not address IoT specialized security requirements. This paper introduces xPython, a novel secure-by-design operating system for IoT subsystems (devices and gateways). xPython provides transparent security solutions for common threats in addition to a security library for custom security implementation. xPython minimizes the time required to develop security features. xPython is secure by design to ensure security features are included at all stages of product creation and deployment. This paper proposes a new architecture for IoT operating systems, and it ends with a complete prototype implementation. The proposed architecture integrates security services inside operating system layers. It affects device initiation, communication protocols, application deployment, and application execution, ensuring software is executed securely, including non-secure applications (secure boot) and storage access. The proposed security solutions are inspired by previous work in Smart Cards. Smart Cards are considered a trusted environment for identification, authentication, and confidentiality. Finally, xPython is built over a real-time operating system to fulfill embedded systems requirements. The xPython development is also performed using Micro-Python to simplify the development process and reduc
This paper investigates the problem of zero-day malicious software (Malware) detection through unsupervised deep learning. We built a sequence-to-sequence auto-encoder model for learning the behavior of normal softwar...
This paper investigates the problem of zero-day malicious software (Malware) detection through unsupervised deep learning. We built a sequence-to-sequence auto-encoder model for learning the behavior of normal software by monitoring the sequence of operating system kernel API calls. After training is completed, the model is used to identify malicious software activities through assigning an anomaly score for each testing sample. The model achieves 90% AUC score compared to 86% AUC score for the previous work done over the same dataset used for performance assessment.
Advances in both quantum computation and blockchain systems necessitate a rigid analysis for the security of blockchains in the advent of powerful quantum computers. Computational problems that are proved or believed ...
详细信息
ISBN:
(数字)9781728152608
ISBN:
(纸本)9781728152615
Advances in both quantum computation and blockchain systems necessitate a rigid analysis for the security of blockchains in the advent of powerful quantum computers. Computational problems that are proved or believed to be intractable by classical computers are known to be attacked by well-studied quantum algorithms. Such problems are used as basis to secure blockchains and hence the security of such systems must be defended. As proof-of-work is used in early blockchains to maintain consensus, proof-of-stake was proposed to lower its high energy consumption and provide a higher network throughput. Proof-of-Stake has hence got an increasing interest, variations, implementations and enhancements whilst its quantum security defenses remained almost the same. By comparing proof-of-work to proof-of-stake, we find that the latter is more vulnerable to certain attack vectors. We suggest general defenses for quantum-resilient blockchains and thoroughly analyze post-quantum signature schemes to select an appropriate alternative to the most serious threat on conventional digital signatures.
Blockchain as a distributed data structure or ledger is perceived to provide solutions in manifold areas beyond their prominent form of digital currency; they also showed several challenges. As enhancements to the exi...
详细信息
ISBN:
(数字)9781728152608
ISBN:
(纸本)9781728152615
Blockchain as a distributed data structure or ledger is perceived to provide solutions in manifold areas beyond their prominent form of digital currency; they also showed several challenges. As enhancements to the existing blockchain systems are being proposed and developed, alternative underlying data structures were driven to solve some of the challenges facing them whilst maintaining their key ideas. We start by explaining the key concepts of the blockchain as implemented in Bitcoin and Ethereum. from there, we explain the challenges and survey on the alternative data structures along with their consensus mechanisms. We find a generalization in using hash pointers in the alternative data structures and unfold the current research and implementation directions for solutions to the challenges.
作者:
Dutt, NikilRegazzoni, Carlo S.Rinner, BernhardYao, XinNikil Dutt (Fellow
IEEE) received the Ph.D. degree from the University of Illinois at Urbana–Champaign Champaign IL USA in 1989.""He is currently a Distinguished Professor of computer science (CS) cognitive sciences and electrical engineering and computer sciences (EECS) with the University of California at Irvine Irvine CA USA. He is a coauthor of seven books. His research interests include embedded systems electronic design automation (EDA) computer architecture distributed systems healthcare Internet of Things (IoT) and brain-inspired architectures and computing.""Dr. Dutt is a Fellow of ACM. He was a recipient of the IFIP Silver Core Award. He has received numerous best paper awards. He serves as the Steering Committee Chair of the IEEE/ACM Embedded Systems Week (ESWEEK). He is also on the steering organizing and program committees of several premier EDA and embedded system design conferences and workshops. He has served on the Editorial Boards for the IEEE Transactions on Very Large Scale Integration (VLSI) Systems and the ACM Transactions on Embedded Computing Systems and also previously served as the Editor-in-Chief (EiC) for the ACM Transactions on Design Automation of Electronic Systems. He served on the Advisory Boards of the IEEE Embedded Systems Letters the ACM Special Interest Group on Embedded Systems the ACM Special Interest Group on Design Automationt and the ACM Transactions on Embedded Computing Systems. Carlo S. Regazzoni (Senior Member
IEEE) received the M.S. and Ph.D. degrees in electronic and telecommunications engineering from the University of Genoa Genoa Italy in 1987 and 1992 respectively.""He is currently a Full Professor of cognitive telecommunications systems with the Department of Electrical Electronics and Telecommunication Engineering and Naval Architecture (DITEN) University of Genoa and a Co-Ordinator of the Joint Doctorate on Interactive and Cognitive Environments (JDICE) international Ph.D. course started initially as EU Erasmus Mundus Project and
Autonomous systems are able to make decisions and potentially take actions without direct human intervention, which requires some knowledge about the system and its environment as well as goal-oriented reasoning. In c...
详细信息
Autonomous systems are able to make decisions and potentially take actions without direct human intervention, which requires some knowledge about the system and its environment as well as goal-oriented reasoning. In computersystems, one can derive such behavior from the concept of a rational agent with autonomy (“control over its own actions”), reactivity (“react to events from the environment”), proactivity (“act on its own initiative”), and sociality (“interact with other agents”) as fundamental properties \n[1]\n. Autonomous systems will undoubtedly pervade into our everyday lives, and we will find them in a variety of domains and applications including robotics, transportation, health care, communications, and entertainment to name a few. \nThe articles in this month’s special issue cover concepts and fundamentals, architectures and techniques, and applications and case studies in the exciting area of self-awareness in autonomous systems.
Power consumption is a very important issue when it comes to embedded devices, therefore every processing cycle should be optimally utilized and considered. In speculated execution, highly mispredicted branches are co...
详细信息
Power consumption is a very important issue when it comes to embedded devices, therefore every processing cycle should be optimally utilized and considered. In speculated execution, highly mispredicted branches are considered a critical threat for both time and power saving. In this paper, we show that, for a specific branch, misprediction rate of a 2-bit branch predictor can be precisely calculated using Markov model. Further, this can be done offline for more power saving. Thus, a decision of replacing the branch with conditional (predicated) instructions instead of counting on the predictor can be made.
暂无评论