{"title":"Next-Generation Network Intrusion Detection System (NG-NIDS)","authors":"Yazan Alnajjar, Jinane Mounsef","doi":"10.1109/TELSIKS52058.2021.9606424","DOIUrl":"https://doi.org/10.1109/TELSIKS52058.2021.9606424","url":null,"abstract":"This paper introduces the Next-Generation Network Intrusion Detection System (NG-NIDS) with intelligent capabilities based on the Artificial Neural Networks (ANN) and Machine Learning (ML) algorithms. The results have been achieved by training the model on a benign as well as malicious traffic. The proposed NG-NIDS achieved 99.9% accuracy of detecting the malicious traffic, which reflects the fact that this design is accurate and reliable.","PeriodicalId":228464,"journal":{"name":"2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128518481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Srđan Maričić, D. Milic, N. Milosevic, J. Anastasov, P. Císar
{"title":"Asymptotic Analysis of Physical Layer Security versus Reliability in IoT Wireless Transmission","authors":"Srđan Maričić, D. Milic, N. Milosevic, J. Anastasov, P. Císar","doi":"10.1109/TELSIKS52058.2021.9606421","DOIUrl":"https://doi.org/10.1109/TELSIKS52058.2021.9606421","url":null,"abstract":"In this paper, we investigate security-reliability tradeoff on physical layer in Internet of Things (IoT) network, when an eavesdropper tries to intercept secure transmission. The best-node scheduling scheme is employed as an auxiliary tool to decrease probability of intercept. The main and also wiretap channels are assumed to be subjected to composite generalized-K fading. Asymptotic expression of security versus reliability, valid in the range of medium to high average main-to-eavesdropper’s signal ratio (MER) values, is derived. The impact of different system parameters such as IoT network dimension, fading/shadowing conditions, path loss and average MER on intercept probability versus outage probability is observed, and then accompanying numerical results are shown.","PeriodicalId":228464,"journal":{"name":"2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133595991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Special Session: Advanced Sensor Technologies in Biomedical Applications and Healthcare","authors":"","doi":"10.1109/telsiks52058.2021.9606295","DOIUrl":"https://doi.org/10.1109/telsiks52058.2021.9606295","url":null,"abstract":"","PeriodicalId":228464,"journal":{"name":"2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132789360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computational Electromagnetics & EMC","authors":"","doi":"10.1109/telsiks52058.2021.9606313","DOIUrl":"https://doi.org/10.1109/telsiks52058.2021.9606313","url":null,"abstract":"","PeriodicalId":228464,"journal":{"name":"2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125117942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative Analysis of K-band Crossed Slot and Crossed Dipole Antennas","authors":"M. Milijić, B. Jokanović, Luka Lazovic","doi":"10.1109/TELSIKS52058.2021.9606327","DOIUrl":"https://doi.org/10.1109/TELSIKS52058.2021.9606327","url":null,"abstract":"In this paper a comparison between the crossed dipole and the corresponding crossed slot antennas intended for K-band applications has been presented. The analysis of the crossed slot and dipole antennas which are complementary structures is carried out to investigate their performances focusing with two objectives: one is to study their advantages as the single radiating elements suitable for energy harvesting applications and the other is to evaluate their applicability as a radiating element in an array. Therefore, both antennas were simulated and optimized at 25.875 GHz on the same substrate with added parallel reflector plate. The simulated results are presented and discussed.","PeriodicalId":228464,"journal":{"name":"2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129035095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Olivier Leblanc, L. Tadrist, N. Moreau, B. Brun, T. Gilet, B. Hackens
{"title":"An Affordable Pedagogical Setup for Wave-particule Duality and Applications to Chaotic Stadium Cavity","authors":"Olivier Leblanc, L. Tadrist, N. Moreau, B. Brun, T. Gilet, B. Hackens","doi":"10.1109/TELSIKS52058.2021.9606385","DOIUrl":"https://doi.org/10.1109/TELSIKS52058.2021.9606385","url":null,"abstract":"Walking droplets represent an ideal playground to explore wave-particle duality at the macroscopic scale. The proper control and measurement of such system requires several experimental tools that are not often easily affordable at undergraduate level. This paper proposes a complete low-cost and open-source experimental setup for walking droplets with a performance characterization. The setup is tested by examining the behaviour of droplets in the stadium billiard, a two-dimensional concave cavity that yields chaotic trajectories. Drastic differences between classical and quantum particles behaviour were observed in such geometry. In particular, the long-term evolution of walking droplets in a stadium billiard presents clear scarring patterns, informing on the existence of preferred \"probable positions\" within the billiard.","PeriodicalId":228464,"journal":{"name":"2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129958686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ultramarathon Result and Injury Prediction using PyTorch","authors":"Valentina Nejkovic, Masa Radenkovic, N. Petrovic","doi":"10.1109/TELSIKS52058.2021.9606348","DOIUrl":"https://doi.org/10.1109/TELSIKS52058.2021.9606348","url":null,"abstract":"In this paper, it is explored how the data about trainings, competitions and weather can be leveraged for result and injury prediction in competitive running disciplines. As outcome, two prediction models based on multilayer neural networks are implemented using PyTorch framework for Python programming language and evaluated on dataset containing realistic data of ultramarathon runner. The first model treats problem as regression to predict the number of kilometers run for given ultramarathon duration, while another one determines whether injury will occur for given running distance or no using classification approach. According to our results, both models show satisfiable performance (up to 2% relative error for regression, 70% correct for classification), while the first one performs better, which can be explained by lack of enough injury records in the second case. Moreover, a companion mobile app developed using AppSheet and Google Apps Script for automated dataset construction is introduced.","PeriodicalId":228464,"journal":{"name":"2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126415898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental Investigation on the Bias and Temperature Dependence of the Forward Transmission Coefficient for HEMT Technologies","authors":"M. Alim, C. Gaquière, G. Crupi","doi":"10.1109/TELSIKS52058.2021.9606356","DOIUrl":"https://doi.org/10.1109/TELSIKS52058.2021.9606356","url":null,"abstract":"The goal of this research is to look at the effects of temperature on the forward transmission coefficient (S21) of high electron-mobility transistors (HEMTs), employing various technologies. The analysis is carried out on six different devices under different bias conditions with the ambient temperature varied from -40°C to 150°C. The low-frequency magnitude of S21 is significantly reduced in GaN-based HEMTs when the temperature is increased. On the other hand, an operating bias point where this magnitude is temperature insensitive has been identified in GaAs-based HEMTs.","PeriodicalId":228464,"journal":{"name":"2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"2017 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127551588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Algorithm for the VLSI Implementation of Inverse DCT Based on Quasi-Circular Correlation Structures","authors":"D. Chiper, L. Cotorobai","doi":"10.1109/TELSIKS52058.2021.9606373","DOIUrl":"https://doi.org/10.1109/TELSIKS52058.2021.9606373","url":null,"abstract":"This paper proposes a new VLSI algorithm for a inverse discrete cosine transform (IDCT) designed for an efficient implementation of the obfuscation technique. The proposed algorithm is using quasi-circular correlation structures and is highly regular and modular. The method presents a low hardware complexity, a high throughput and it can be mapped using a low number of I/O channels which in turn translates to a low bandwidth on linear systolic arrays. Additionally, most of the parts of the architecture are working at a significantly lower frequency than the main systolic array. Using the time-varying obfuscation method, the proposed algorithm presents the additional advantage in the field of hardware security and it can be efficiently implemented on a VLSI chip with a low power consumption due to its low hardware complexity.","PeriodicalId":228464,"journal":{"name":"2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121006905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physical Layer Communication Security in Smart Cities: Challenges and Threats Identification","authors":"M. Simić, M. Stanković, V. Orlic","doi":"10.1109/TELSIKS52058.2021.9606370","DOIUrl":"https://doi.org/10.1109/TELSIKS52058.2021.9606370","url":null,"abstract":"Communication technologies will have tremendous presence in modern smart cities, providing means for massive data collection, plethora of services and technical management and control. However, as the complexity of the underlying communication systems increases, so do the security challenges and risks, which raises concerns about the smart city technology in general. Standard communication security approaches implemented in conventional wireless and wired networks are typically focused only on specific protocols and communication schemes, and, hence, are not well grounded for smart cities from the complexity and diversity point of view. In this paper, we discuss physical layer communication security challenges and risks in smart cities. We argue that, besides higher-level information protection, an appropriate framework for intrusion detection and threat/attack classification and identification is of utmost importance. For this purpose, we propose to use methods based on applying automatic modulation classification (AMC) systems. We provide overview of the appropriate AMC schemes, and discuss their properties, advantages and disadvantages in tackling the security challenges.","PeriodicalId":228464,"journal":{"name":"2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121408843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}