2015 Internet Technologies and Applications (ITA)最新文献

筛选
英文 中文
A systematic mapping on security threats in mobile devices 移动设备安全威胁的系统映射
2015 Internet Technologies and Applications (ITA) Pub Date : 2015-09-01 DOI: 10.1109/ITECHA.2015.7317411
Anselmo Lacerda, R. D. de Queiroz, M. Barbosa
{"title":"A systematic mapping on security threats in mobile devices","authors":"Anselmo Lacerda, R. D. de Queiroz, M. Barbosa","doi":"10.1109/ITECHA.2015.7317411","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317411","url":null,"abstract":"The increase in the use of mobile devices and the large amount of sensitive information that they store make them valuable targets for cybercriminals. In this work, we use the systematic mapping methodology to identify what are the main security incidents targeting mobile devices and what are their main causes. Finally, this research aims to propose some guidelines to avoid or minimize the extent of the damages provoked by these incidents.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133490923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance concerns when implementing infrastructure security in IPv4/IPv6 networks 在IPv4/IPv6网络中实现基础设施安全时的性能问题
2015 Internet Technologies and Applications (ITA) Pub Date : 2015-09-01 DOI: 10.1109/ITECHA.2015.7317393
M. Verovko, Oleksandr Verovko, V. Kazymyr, John N. Davies, V. Grout
{"title":"Performance concerns when implementing infrastructure security in IPv4/IPv6 networks","authors":"M. Verovko, Oleksandr Verovko, V. Kazymyr, John N. Davies, V. Grout","doi":"10.1109/ITECHA.2015.7317393","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317393","url":null,"abstract":"Internet Service Providers (ISPs) throughout the world are beginning the rollout of IPv6 networks to cater for the increase in the number of devices connected to the Internet. Without the use of this technology the internet would not be able grow at the present rate. Network security has become a very important function of the network infrastructure since it has the ability to limit the packets that can be passed. This functionality is usually implemented as an Access Control List (ACL) within a router. ACLs are created from rules that specify the action to be taken for any packet which is tested and matched against it. Rules are put together to form an ordered. If a match is made on a particular rule the packet is either permitted or denied and no further rules are evaluated. This paper investigates the effect on the delays through a router when ACLs are implemented using an IPv6 addressing scheme. With the increase in the bandwidth of networks the delays through networking equipment can become significant and so this is the main area of research. A comparison is made with similar ACLs implemented in an IPv4 and IPv6 network. Additionally the tests are repeated using an IPv6-IPv4-IPv6 Tunnel to compare the delays with the previous results. To eliminate the uncertainties related to the internet performance a set of experiments were conducted on a laboratory network ensuring that the comparisons are consistent.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126473197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Simulating and modelling the impact of secure communication latency for closed loop control 对安全通信延迟对闭环控制的影响进行了仿真和建模
2015 Internet Technologies and Applications (ITA) Pub Date : 2015-09-01 DOI: 10.1109/ITECHA.2015.7317384
R. D. Sparrow, A. A. Adekunle, R. J. Berry, R. Farnish
{"title":"Simulating and modelling the impact of secure communication latency for closed loop control","authors":"R. D. Sparrow, A. A. Adekunle, R. J. Berry, R. Farnish","doi":"10.1109/ITECHA.2015.7317384","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317384","url":null,"abstract":"Closed loop control systems have been implemented to conduct a variety of tasks (e.g. manufacturing and automation). Industrial Control System (ICS) have been used to regulate a closed loop process; however, ICS are exposed to the same security vulnerabilities associated with enterprise networks. Cryptography has been deployed to overcome the associated data communication weaknesses between each ICS node through the use of block ciphers; however, the drawback of applying cryptographic algorithms to ICS is the additional communication latency. This paper investigates the relationship between security constructs and latency for closed loop control system with test conducted in a simulated environment. A case scenario is illustrated to demonstrate the impact of the results obtained to a real world context.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121023198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personalized learning materials for children with special needs using machine learning 使用机器学习为有特殊需要的儿童提供个性化学习材料
2015 Internet Technologies and Applications (ITA) Pub Date : 2015-09-01 DOI: 10.1109/ITECHA.2015.7317390
Likhan Banik, Monir Bhuiyan, Azmery Jahan
{"title":"Personalized learning materials for children with special needs using machine learning","authors":"Likhan Banik, Monir Bhuiyan, Azmery Jahan","doi":"10.1109/ITECHA.2015.7317390","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317390","url":null,"abstract":"Children with neurological disorder such as autism need personalized development system for their daily activities. Technology can play a significant role. This paper introduces a research to deliver personalized learning materials for children with special needs based on diverse characteristics of children. There are four parts of the system: i) identifying level of the user by using machine learning algorithm. ii) web mining to generate multimodal learning materials from text story or learning keywords, iii) linking user preferences and IoT enabled sensor data with the result, iv) personalizing contents for users delineated with an intelligent interface. This paper explains personalization of results using machine learning algorithm.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122413137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Compact size uni-planer small Metamaterial-Inspired antenna for UWB applications 用于超宽带应用的紧凑尺寸单平面小型超材料启发天线
2015 Internet Technologies and Applications (ITA) Pub Date : 2015-09-01 DOI: 10.1109/ITECHA.2015.7317443
N. A. Jan, F. Elmegri, M. Bin-Melha, R. Abd‐Alhameed, M. Lashab, C. See
{"title":"Compact size uni-planer small Metamaterial-Inspired antenna for UWB applications","authors":"N. A. Jan, F. Elmegri, M. Bin-Melha, R. Abd‐Alhameed, M. Lashab, C. See","doi":"10.1109/ITECHA.2015.7317443","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317443","url":null,"abstract":"In this paper, low profile planar Metamaterial-Inspired coplanar fed waveguide antenna is presented for WLAN and Ultra-Wideband applications. The antenna is based on a simple strip loaded to a rectangular patch and zigzag E-shape metamaterial-inspired unit cell. The idea behind the proposed antenna is to enable miniaturization effect. The proposed antenna can provide dual band operation, the first one is a Wi-Fi band at 2.45 GHz having impedance bandwidth of 150MHz, the second one is an ultra wide band extended from 4.2 GHz to 6.5 GHz. Two antennas are designed and fabricated with and without metamaterial-inspired loading. The simulated and measured results regarding Return loss (S11), Gain and Radiation pattern are discussed.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"22 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121012992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the usefulness of machine learning techniques in collaborative anomaly detection 机器学习技术在协同异常检测中的应用
2015 Internet Technologies and Applications (ITA) Pub Date : 2015-09-01 DOI: 10.1109/ITECHA.2015.7317397
Secil Senel-Kleine, Johannes Bouché, Martin Kappes
{"title":"On the usefulness of machine learning techniques in collaborative anomaly detection","authors":"Secil Senel-Kleine, Johannes Bouché, Martin Kappes","doi":"10.1109/ITECHA.2015.7317397","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317397","url":null,"abstract":"Due to the increase in network attacks, anomaly detection has gained importance. In this paper, we present and investigate the idea of institutions cooperating for performing anomaly detection, i.e. institutions jointly analyzing their network traffic, in order to identify malicious attacks, using classification-based machine learning techniques. We compare the results of such a collaborative analysis with a single analysis. Moreover, as institutions might not be willing to share confidential data, we analyze the benefits of a collaborative approach if some parts of the traffic are being anonymized. While, intuitively, having more data at hand should lead to improved detection rates, our results indicate that a federated analysis using standard classification-based methods improves detection rates only slightly. Moreover, when using anonymized data, the obtained detection rates of a joint data analysis further deteriorate such that the analysis of individual traffic is more useful. Thus, our research indicates that the classical classification based machine learning approaches for anomaly detection must be adapted and improved in order to leverage the advantage of having data from various sources.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128408297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and analysis of a simple UHF passive RFID tag for liquid level monitoring applications 设计和分析一个简单的UHF无源RFID标签,用于液位监测应用
2015 Internet Technologies and Applications (ITA) Pub Date : 2015-09-01 DOI: 10.1109/ITECHA.2015.7317453
A. Atojoko, R. Abd‐Alhameed, H. Rajamani, N. McEwan, C. See, P. Excell
{"title":"Design and analysis of a simple UHF passive RFID tag for liquid level monitoring applications","authors":"A. Atojoko, R. Abd‐Alhameed, H. Rajamani, N. McEwan, C. See, P. Excell","doi":"10.1109/ITECHA.2015.7317453","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317453","url":null,"abstract":"Radio Frequency Identification (RFID) systems has gained increasing popularity with multiple deployments to existing wireless sensors in a view to achieve energy and overall operational efficiency at a much lower cost. This paper presents the design and analysis of a UHF (860-868MHZ) passive tag using HFSS (High Frequency Structural Simulator) platform. It explores specific tag geometry characteristics that affect overall tag antenna performance and presents the optimised result. The simulation results and parametric analysis are compared. Further simulations on HFSS platform is carried out to theoretically demonstrate the reflections of the tag when deployed as sensors to multiple levels of a cistern.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130461396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CP-QFSK modem for TDMA short range communications systems 用于TDMA短距离通信系统的CP-QFSK调制解调器
2015 Internet Technologies and Applications (ITA) Pub Date : 2015-09-01 DOI: 10.1109/ITECHA.2015.7317454
M. Bomhara, J. Gardiner, Huthaifa Obeidat, R. Abd‐Alhameed
{"title":"CP-QFSK modem for TDMA short range communications systems","authors":"M. Bomhara, J. Gardiner, Huthaifa Obeidat, R. Abd‐Alhameed","doi":"10.1109/ITECHA.2015.7317454","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317454","url":null,"abstract":"Work presented in this paper investigates the feasibility of Continuous-Phase Quaternary Frequency Shift Keying (CP-QFSK) with limiter-discriminator detection modem as a viable dual data rate system that can be employed in TDMA short range communications systems. It offers a great deal of spectral efficiency in multi-channel systems, hardware simplicity and robustness to adjacent Channel Interference (ACI). The interrelated system design parameters are defined and optimized and the system performance in different propagation media is evaluated. Simulation results have demonstrated that adjacent channel rejection factor of 40 dB has been achieved and that the CP-QFSK system outperforms the GMSK modulation scheme as it causes far less ACI, and hence coexists well in a multi-channel system. Error correction coding has been applied to enhance the system quality.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134200630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two basic iterative solving methods of Cauchy problem of the first order equations 一阶方程柯西问题的两种基本迭代求解方法
2015 Internet Technologies and Applications (ITA) Pub Date : 2015-09-01 DOI: 10.1109/ITECHA.2015.7317410
K. Younis, Nikolay Tsapenko
{"title":"Two basic iterative solving methods of Cauchy problem of the first order equations","authors":"K. Younis, Nikolay Tsapenko","doi":"10.1109/ITECHA.2015.7317410","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317410","url":null,"abstract":"In this paper by employing similar standard methods, the theorem of two essential iterative processes namely, Pickard and Newton's applicable to Cauchy's problem for the first order ordinary differential equations have been proved. Those methods permit to compare the mentioned processes by both its convergence acceleration and by its segment length convergence. It has been demonstrated that, the iteration calculated by Newton's method, incomparably excessive rapidity approach to the exact solution. In the same time the segment lengths for which the given iterative process converges, do not diverge too much from each other. The application of the solution method of the general Ricatti's equation with acquired numerical results, developed by the authors has been revealed.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133595793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Versatile and Ubiquitous Secret Sharing 通用且无处不在的秘密共享
2015 Internet Technologies and Applications (ITA) Pub Date : 2015-09-01 DOI: 10.1109/ITECHA.2015.7317449
Muhammad Adeka, S. Shepherd, R. Abd‐Alhameed, Nuredin A. S. Ahmed
{"title":"A Versatile and Ubiquitous Secret Sharing","authors":"Muhammad Adeka, S. Shepherd, R. Abd‐Alhameed, Nuredin A. S. Ahmed","doi":"10.1109/ITECHA.2015.7317449","DOIUrl":"https://doi.org/10.1109/ITECHA.2015.7317449","url":null,"abstract":"The Versatile and Ubiquitous Secret Sharing System, a cloud data repository secure access and a web based authentication scheme. It is designed to implement the sharing, distribution and reconstruction of sensitive secret data that could compromise the functioning of an organisation, if leaked to unauthorised persons. This is carried out in a secure web environment, globally. It is a threshold secret sharing scheme, designed to extend the human trust security perimeter. The system could be adapted to serve as a cloud data repository and secure data communication scheme. A secret sharing scheme is a method by which a dealer distributes shares of a secret data to trustees, such that only authorised subsets of the trustees can reconstruct the secret. This paper gives a brief summary of the layout and functions of a 15-page secure server-based website prototype; the main focus of a PhD research effort titled `Cryptography and Computer Communications Security: Extending the Human Security Perimeter through a Web of Trust'. The prototype, which has been successfully tested, has globalised the distribution and reconstruction processes.","PeriodicalId":161782,"journal":{"name":"2015 Internet Technologies and Applications (ITA)","volume":"48 43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124221123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信