2015 7th International Conference on New Technologies, Mobility and Security (NTMS)最新文献

筛选
英文 中文
Towards software defined cognitive networking 走向软件定义的认知网络
Ijaz Ahmad, Suneth Namal, M. Ylianttila, A. Gurtov
{"title":"Towards software defined cognitive networking","authors":"Ijaz Ahmad, Suneth Namal, M. Ylianttila, A. Gurtov","doi":"10.1109/NTMS.2015.7266528","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266528","url":null,"abstract":"Cognitive networking has the potential to enable autonomic network management by empowering the network components to automatically adjust to the changing network environment. However, strict isolation between the layers of the currently used communication model and static nature of networking equipment have delimited the deployment of cognitive networks. Software Defined Networking (SDN) separates the network architecture from its infrastructure to enable programmatic control of networking equipment from logically centralized servers. By adopting the principles of SDN, we propose software defined cognitive networking (SDCoN) to integrate the dynamism of cognitive networking and programmatic control of SDN. In this paper, we present the SDCoN framework and initial results from the SDCoN testbed that reveal the success of the proposed SDN-based cognitive networking architecture.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116163233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Enhancing immediacy of identification with multi-stage application identification 多阶段应用识别提高识别的即时性
Yuichi Kumano, S. Ata, N. Nakamura, Y. Nakahira, I. Oka
{"title":"Enhancing immediacy of identification with multi-stage application identification","authors":"Yuichi Kumano, S. Ata, N. Nakamura, Y. Nakahira, I. Oka","doi":"10.1109/NTMS.2015.7266492","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266492","url":null,"abstract":"The identification of network application is important for network management such as traffic controls and anomaly traffic detection. To apply application-based traffic control promptly, the technique to progressive application identification is important. We previously proposed a method of timeliness identification of application, which can achieve to use first several packets of flow to identify applications with high accuracy whatever the traffic is encrypted or unencrypted. However, our previous method still has a challenge in terms of timeliness because it uses a single classifier with same traffic features to identify all applications, though some traffic features can be used earlier. In this paper, we propose a method of multistage application identification, which classifies progressively applications into groups with different granularity of groups. We first demonstrate that the accuracy of existing application identification is getting worse significantly, by increasing the number of application to identify. Second, propose a method of multistage identification method, and then explain group classification algorithm to classify applications into groups. Our experiment shows that our proposed method can identify applications earlier than a method of identification using a single classifier.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124104047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of lane keeping assist system for autonomous vehicles 自动驾驶汽车车道保持辅助系统设计
A. Mammeri, Guangqiang Lu, A. Boukerche
{"title":"Design of lane keeping assist system for autonomous vehicles","authors":"A. Mammeri, Guangqiang Lu, A. Boukerche","doi":"10.1109/NTMS.2015.7266483","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266483","url":null,"abstract":"Lane detection and tracking and departure warning systems are important components of Intelligent Transportation Systems. They have particularly attracted great interest from industry and academia. Many architectures and commercial systems have been proposed in the literature. In this paper, we discuss the design of such systems regarding the following stages: pre-processing, detection, and tracking. For each stage, a short description of its working principle as well as their advantages and shortcomings are introduced. Our paper may possibly help in designing new systems that overcome and improve the shortcomings of current architectures.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128766722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
NGNaaS: NGNs as cloud computing services NGNaaS: ngn作为云计算服务
F. Belqasmi, M. Barachi, J. A. Calero, M. Badra, O. Alfandi
{"title":"NGNaaS: NGNs as cloud computing services","authors":"F. Belqasmi, M. Barachi, J. A. Calero, M. Badra, O. Alfandi","doi":"10.1109/NTMS.2015.7266508","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266508","url":null,"abstract":"Next Generation Networks are the future mobile telecommunication networks, capable of provisioning universal access to services (anytime, anywhere, using any device). Cloud computing is an emerging networking paradigm with several inherent advantages including easy introduction of new services, efficient resource use, scalability, and pay-per-use. Cloud computing is ubiquitous in the Internet domain, but its use in the telecommunications context is still in its infancy. Offering next generation networks as cloud computing services will facilitate their deployment and enable deployment and management cost sharing. We envision that many network operators and service providers will soon support this sharing idea, as demonstrated by a number of ongoing agreements and investigation initiatives (e.g. between Rogers and Videotron in Canada, and between Etisalat and DU in the UAE). However, many issues need to be solved before this vision becomes a reality. This position paper presents our vision for offering next generation networks as cloud services, sketches an early business model, identifies the research issues, and presents a roadmap.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125627118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Concept for a security investigation framework 安全调查框架的概念
M. Ussath, Feng Cheng, C. Meinel
{"title":"Concept for a security investigation framework","authors":"M. Ussath, Feng Cheng, C. Meinel","doi":"10.1109/NTMS.2015.7266478","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266478","url":null,"abstract":"The number of detected and analyzed Advanced Persistent Threat (APT) campaigns increased over the last years. Two of the main objectives of such campaigns are to maintain long-term access to the environment of the target and to stay undetected. To achieve these goals the attackers use sophisticated and customized techniques for the lateral movement, to ensure that these activities are not detected by existing security systems. During an investigation of an APT campaign all stages of it are relevant to clarify important details like the initial infection vector or the compromised systems and credentials. Most of the currently used approaches, which are utilized within security systems, are not able to detect the different stages of a complex attack and therefore a comprehensive security investigation is needed. In this paper we describe a concept for a Security Investigation Framework (SIF) that supports the analysis and the tracing of multi-stage APTs. The concept includes different automatic and semi-automatic approaches that support the investigation of such attacks. Furthermore, the framework leverages different information sources, like log files and details from forensic investigations and malware analyses, to give a comprehensive overview of the different stages of an attack. The overall objective of the SIF is to improve the efficiency of investigations and reveal undetected details of an attack.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127683274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Combining cell phones and WSNs for preventing accidents in smart-homes with disabled people 将手机和无线传感器网络结合起来,防止残疾人智能家中发生事故
Diulie J. Freitas, Tiago B. Marcondes, L. H. Nakamura, J. Ueyama, P. Gomes, R. Meneguette
{"title":"Combining cell phones and WSNs for preventing accidents in smart-homes with disabled people","authors":"Diulie J. Freitas, Tiago B. Marcondes, L. H. Nakamura, J. Ueyama, P. Gomes, R. Meneguette","doi":"10.1109/NTMS.2015.7266477","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266477","url":null,"abstract":"Smart homes provide automatic services through a combination of wireless sensor networks (WSNs) and wireless devices that allow monitoring operations in the home. These smart homes have been increasingly studied not only by the academic community but also by industry on account of the great potential they have, especially in applications that can help people with some type of physical disability such as visual or hearing impairment. This kind of application can give them independence and make their lives safer and more comfortable. Thus, in this paper we propose a Health Smart Home system for disabled people that can warn them about possible accidents that can occur in a particular location of their house. In other words, the system anticipates possible accidents that may occur somewhere in the house. We implemented a preliminary prototype that monitors rooms and issues a warning whenever it detects a potential hazard. Our proposal relies on low-cost cutting-edge technology and includes the following: Raspberry Pi boards, motion sensors, cameras and a central server. The server will handle the data that has been captured by sensors and send warnings through smartphones to people with physical impairments.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133082110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Analysis of XACML policies with ASP 基于ASP的XACML策略分析
D. Ayed, Marie-Noëlle Lepareux, Cyrille Martins
{"title":"Analysis of XACML policies with ASP","authors":"D. Ayed, Marie-Noëlle Lepareux, Cyrille Martins","doi":"10.1109/NTMS.2015.7266473","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266473","url":null,"abstract":"Security policy administrators face difficulties to ensure that the policies they specify in XACML correspond to what they intend to formulate and to understand their overall effect. This paper proposes a logic-based XACML3.0 analysis solution using Answer Set Programming (ASP) where Ansprolog is used to model the XACML decision process and an ASP solver is employed in an innovative way to perform logical reasoning on access control policies such as detecting conflicts in a multi-organizational context.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115911349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Kullback-Leibler divergence as an estimate of reproducibility of numerical results Kullback-Leibler散度对数值结果再现性的估计
F. Calvayrac
{"title":"Kullback-Leibler divergence as an estimate of reproducibility of numerical results","authors":"F. Calvayrac","doi":"10.1109/NTMS.2015.7266501","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266501","url":null,"abstract":"In large software projects using numerical solutions of equations, small changes in compiler options or parallelization methods can induce slight variations in the last digits of floating point numerical results, due for instance to the non-commutativity of operations. Unfortunate changes in the code (bugs) can induce even larger deviations in the results. We propose to use the Kullback-Leibler divergence estimated from the compression ratio of the results compared to reference results in order to automatically quantify those changes and automatize regression tests of numerical codes in software forges. We use the TDDFT PW-TELEMAN project as an example.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121923756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Integrating OpenFlow to LTE: Some issues toward software-defined mobile networks 将OpenFlow集成到LTE:软件定义移动网络的一些问题
L. J. Chaves, Vitor Marge Eichemberger, Islene C. Garcia, E. Madeira
{"title":"Integrating OpenFlow to LTE: Some issues toward software-defined mobile networks","authors":"L. J. Chaves, Vitor Marge Eichemberger, Islene C. Garcia, E. Madeira","doi":"10.1109/NTMS.2015.7266498","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266498","url":null,"abstract":"The world is witnessing a rapid growth in mobile communication, and operators have been forced to handle network traffic more resourcefully. Many works point to the use of Software-Defined Networking (SDN) as an enabling technology to overcome current limitations, making possible upcoming 5G networks. In this paper we discuss how the OpenFlow protocol can be integrated into existing Long-Term Evolution (LTE) networks, going through state-of-the-art solutions and highlighting open issues. We also introduce a novel OpenFlow module for ns-3 simulator, allowing reliable simulations of LTE-SDN integrated networks, as illustrate in a case study example.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127108098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
The design of a rateless channel coding scheme for deep-space communication 深空通信中无速率信道编码方案的设计
Shaolei Chen, Chuangmu Yao, Rui Dai
{"title":"The design of a rateless channel coding scheme for deep-space communication","authors":"Shaolei Chen, Chuangmu Yao, Rui Dai","doi":"10.1109/NTMS.2015.7266524","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266524","url":null,"abstract":"In this paper, a rateless channel coding scheme is proposed for deep-space communication. Unlike the traditional fixed-rate coding schemes, in our scheme the coding rate is not designed as a fixed value before transmission, but adaptive to the channel variations resulted from the dynamically varied transmission distance and complex atmospheric conditions. Specifically, a Raptor code which is provided by a cascade structure is adopted for the data transmission. The pre-code of Raptor code is encoded with a linear-time progressive edge-growth algorithm which avoids tedious calculations by matrix transformation. Moreover, based on a joint iterative decoding method, the output degree distribution of our Raptor code is optimized so as to obtain good decoding performances. Comparisons are provided with respect to the fixed-rate coding schemes by numerical simulation, which shows that our proposed rateless coding scheme has better performance and is adaptively capacity-approaching for the deep-space data transmission.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126597729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信