2015 7th International Conference on New Technologies, Mobility and Security (NTMS)最新文献

筛选
英文 中文
IPOL: A new journal for fully reproducible research; analysis of four years development IPOL:完全可重复研究的新期刊;四年发展分析
M. Colom, Bertrand Kerautret, Nicolas Limare, P. Monasse, J. Morel
{"title":"IPOL: A new journal for fully reproducible research; analysis of four years development","authors":"M. Colom, Bertrand Kerautret, Nicolas Limare, P. Monasse, J. Morel","doi":"10.1109/NTMS.2015.7266500","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266500","url":null,"abstract":"After four years of development of the Image Processing On Line journal (IPOL), this article presents a first analysis and overview of its scientific and technical development. The main issues met and overcome from the beginning of the journal are described with a focus on the purpose of the journal to establish a state of the art on the main Image Processing topics. The evolution of the online demonstration is also presented with a first analysis of author/publisher criticism, which led to a proposal for a new modular architecture of its demo system.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133499697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Indoor patient monitoring through Wi-Fi and mobile computing 通过Wi-Fi和移动计算进行室内患者监测
João M. G. Duarte, E. Cerqueira, L. Villas
{"title":"Indoor patient monitoring through Wi-Fi and mobile computing","authors":"João M. G. Duarte, E. Cerqueira, L. Villas","doi":"10.1109/NTMS.2015.7266497","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266497","url":null,"abstract":"The developments in wireless sensor networks, mobile technology and cloud computing have been pushing forward the concept of intelligent or smart cities, and each day smarter infrastructures are being developed with the aim of enhancing the well-being of citizens. These advances in technology can provide considerable benefits for the diverse components of smart cities including smart health which can be seen as the facet of smart cities dedicated to healthcare. A considerable defy that stills requiring appropriate responses is the development of mechanisms to detect health issues in patients from the very beginning. In this work, we propose a novel solution for indoor patient monitoring for medical purposes. The output of our solution will consist of a report containing the patterns of room occupation by the patient inside her/his home during a certain period of time. This report will allow health care professionals to detect changes on the behavior of the patient that can be interpreted as early signs of any health related issue. The proposed solution was implemented in an Android smartphone and tested in a real scenario. To assess our solution, 400 measurements divided into 10 experiments were performed, reaching a total of 391 correct detections which corresponds to an average effectiveness of 97.75%.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"87 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127994199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs) 在选择针对高级持续性威胁(apt)的安全对策时考虑技术和财务影响
G. G. Granadillo, Joaquín García, Hervé Debar, C. Ponchel, Laura Rodriguez Martin
{"title":"Considering technical and financial impact in the selection of security countermeasures against Advanced Persistent Threats (APTs)","authors":"G. G. Granadillo, Joaquín García, Hervé Debar, C. Ponchel, Laura Rodriguez Martin","doi":"10.1109/NTMS.2015.7266480","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266480","url":null,"abstract":"This paper presents a model to evaluate and select security countermeasures from a pool of candidates. The model performs industrial evaluation and simulations of the financial and technical impact associated to security countermeasures. The financial impact approach uses the Return On Response Investment (RORI) index to compare the expected impact of the attack when no response is enacted against the impact after applying security countermeasures. The technical impact approach evaluates the protection level against a threat, in terms of confidentiality, integrity, and availability. We provide a use case on malware attacks that shows the applicability of our model in selecting the best countermeasure against an Advanced Persistent Threat.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121223227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A remote deep sleep monitoring system based on a single channel for in-home insomnia diagnosis 一种基于单通道的远程深度睡眠监测系统,用于家庭失眠诊断
Sana Tmar-Ben Hamida, B. Ahmed
{"title":"A remote deep sleep monitoring system based on a single channel for in-home insomnia diagnosis","authors":"Sana Tmar-Ben Hamida, B. Ahmed","doi":"10.1109/NTMS.2015.7266469","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266469","url":null,"abstract":"An efficient insomnia diagnosis and treatment requires the analysis of sleep stages and patterns in the vital signals and clinical face-to-face consultations. The measured signals are collected from different locations on the head and the body and used to evaluate the sleep quality and quantity. Generally, these measurements require spending several days of monitoring at sleep centers. However, the first night effect may cause perturbations to the control subjects and contrary to insomnia subjects who may sleep better because of the change of the sleep environment. Therefore, there is a great interest in developing non-invasive ambulatory physiological insomnia monitoring devices for in-home use. It has been shown in previous studies that the sleep quality can be evaluated based on the quantity of length of deep sleep particularly the slow wave sleep (SWS) periods. The aim of this paper is to present a new method to evaluate the deep sleep epochs using a single electrooculogram channel and to collect remotely the subjective data through sleep diaries.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121489155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Borrowing address from two-hop neighbor to improve successful probability of joining IEEE 802.15.5-based mesh wireless sensor networks 借用两跳邻居的地址,提高加入基于IEEE 802.15.5的网状无线传感器网络的成功概率
Cong Sun, Yi-hua Zhu, Li-yong Yuan, Kaikai Chi
{"title":"Borrowing address from two-hop neighbor to improve successful probability of joining IEEE 802.15.5-based mesh wireless sensor networks","authors":"Cong Sun, Yi-hua Zhu, Li-yong Yuan, Kaikai Chi","doi":"10.1109/NTMS.2015.7266474","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266474","url":null,"abstract":"IEEE 802.15.5 standard supports mesh networking for IEEE 802.15.4 based low-rate wireless sensor network (WSN). Through assigning a consecutive address block (CAB) to a node, IEEE 802.15.5 enables routing without table, which eliminates route discovery latency and reduces communication overhead and energy consumption in addition to saving storage space for routing table. With CAB, however, a node may fail in joining the mesh network due to insufficient address. To overcome the address-lacking problem, the scheme called Borrowing Address from Two-hop Neighbor (BATN) is proposed in this paper, which provides with two procedures for the nodes to join or leave the mesh, respectively. In addition, the routing scheme under BATN is presented. Both theoretical and simulation results show that the proposed BATN is better than the basic address assignment scheme introduced in IEEE 802.15.5 standard and the existing address borrowing schemes in terms of the probability of the node's successful joining the mesh network and the number of bytes used in reporting the number of children in address assigning stage.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123386751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design, implementation and evaluation of SDN-based resource management model 基于sdn的资源管理模型的设计、实现与评价
M. R. Çelenlioglu, Mohammed Alsadi, H. A. Mantar
{"title":"Design, implementation and evaluation of SDN-based resource management model","authors":"M. R. Çelenlioglu, Mohammed Alsadi, H. A. Mantar","doi":"10.1109/NTMS.2015.7266484","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266484","url":null,"abstract":"Usage of the Internet has been changed over the past decade. Current tightly-coupled network architecture limits innovative actions. Besides, companies desire to provide better service while keeping their costs low. Software Defined Networking (SDN) is a new approach that provides abstract, programmable and open networking. It is brought up to address these issues. In this study, we present the design, implementation and evaluation of pre-established multi-path (PMP) based intradomain routing and resource management model for SDN-based networks. PMPs are established between each pair of edge nodes. Controller performs routing, admission control and resource management based on these paths. The experimental works show that the proposed model provides scalable admission control, routing and significantly improves resource utilization.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121119842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modeling information flow properties with UML 用UML建模信息流属性
Kuzman Katkalov, K. Stenzel, M. Borek, W. Reif
{"title":"Modeling information flow properties with UML","authors":"Kuzman Katkalov, K. Stenzel, M. Borek, W. Reif","doi":"10.1109/NTMS.2015.7266507","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266507","url":null,"abstract":"Providing guarantees regarding the privacy of sensitive information in a distributed system consisting of mobile apps and services is a challenging task. Our IFlow approach allows the model-driven development of such systems, as well as the automatic generation of code and a formal model. In this paper, we introduce modeling guidelines for the design of intuitive, flexible and expressive information flow properties with UML. Further, we show how these properties can be guaranteed using a combination of automatic language-based information flow control and model-based interactive verification.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127142769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Threats identification for the smart Internet of Things in eHealth and adaptive security countermeasures 面向电子医疗智能物联网的威胁识别及自适应安全对策
Kashif Habib, W. Leister
{"title":"Threats identification for the smart Internet of Things in eHealth and adaptive security countermeasures","authors":"Kashif Habib, W. Leister","doi":"10.1109/NTMS.2015.7266525","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266525","url":null,"abstract":"The Things in the smart Internet of Things (IoT) depend more on self decision making abilities instead of relying on human interventions. In the IoT, static security mechanisms are not well suited to handle all security risks sufficiently. A security mechanism can be considered static if it is developed with fixed security measures whereas an adaptive security mechanism can be considered dynamic if it can continuously monitor, analyse, and reassess a security risk at runtime. Adaptive security mechanisms can be a better choice to secure dynamic and heterogeneous computing systems in the IoT. This paper presents a patient monitoring scenario using the smart IoT and aims at highlighting all important assets, vulnerabilities, and threats that can harm assets and disrupt eHealth systems. We describe adaptive security and introduce a concept of adaptive security countermeasures for the smart IoT in eHealth.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121548195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Ad hoc vehicular: Exploratory evaluation of a vehicular ad hoc network in Urban and highway settings 自组织车辆:在城市和高速公路设置的车辆自组织网络的探索性评价
Claudio Correa, J. Ueyama, R. Meneguette, L. Villas, G. P. R. Filho
{"title":"Ad hoc vehicular: Exploratory evaluation of a vehicular ad hoc network in Urban and highway settings","authors":"Claudio Correa, J. Ueyama, R. Meneguette, L. Villas, G. P. R. Filho","doi":"10.1109/NTMS.2015.7266470","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266470","url":null,"abstract":"A Vehicular Ad hoc network (VANET) represents a unique subset among mobile ad hoc networks (MANET), in which the nodes are vehicles provided with their own communications technology. In this paper, there is a convergence of approaches to meet expectations with regard to examining performance in the operational settings in protocols like AID, DBRS, SRD, and the ADDHV, which are designed to disseminate messages. A comparative evaluation makes it possible to explore the strategies employed by these protocols when faced with challenges such as network partition and the problem of broadcast storm, which can damage the dissemination process. The results shown as a set of metrics obtained in different vehicular traffic schemes complete the investigation.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128163995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhanced LTE physical downlink control channel design for machine-type communications 增强LTE物理下行链路控制信道设计,用于机器类型通信
Jinsong Hu, Mao Wang, K. J. Zou, Kristo W. Yang, Min Hua, Jingjing Zhang
{"title":"Enhanced LTE physical downlink control channel design for machine-type communications","authors":"Jinsong Hu, Mao Wang, K. J. Zou, Kristo W. Yang, Min Hua, Jingjing Zhang","doi":"10.1109/NTMS.2015.7266491","DOIUrl":"https://doi.org/10.1109/NTMS.2015.7266491","url":null,"abstract":"The application of LTE to the machine-type communications (MTC) poses some serious challenges due to the large performance mismatch between the regular LTE user equipment and the MTC device, caused mainly by the physical limitations of MTC devices. This paper addresses these limitations and their implications to the communication signal's link performance and the corresponding link budget. The focus of this paper is on the downlink control channel design. We analyze the issues of the existing LTE control channels and propose an enhanced design specifically-tailored to overcome the limitations of MTC devices and the stringent link budget by applying repeated transmissions, frequency retuning, and the orthogonal spatial precoding based joint channel estimation, fully exploiting the time, frequency, as well as spatial diversities. The basic schemes proposed in this paper apply to other LTE channels as well, such as the uplink control channel, and the random access channel.","PeriodicalId":115020,"journal":{"name":"2015 7th International Conference on New Technologies, Mobility and Security (NTMS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133219291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信