{"title":"Data Loss Prevention and Data Protection in Cloud Environments Based on Authentication Tokens","authors":"Vlad Bucur, O. Stan, L. Miclea","doi":"10.1109/CSCS.2019.00128","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00128","url":null,"abstract":"Data leek issues represents a very high or critical importance within the cloud developers. Given the tremendous growth of cloud computing in the past 3 years the authors of this paper believe that an analysis of the implementation of modern security solutions for data leaks and data protection is of the utmost importance. Authentication tokens, provided by several different cloud providers and third parties, are one of the most common and useful tools that developers have in order to secure their applications. The goal of this paper is to analyze how these tokens are currently used and to provide a solution in order to improve their implementation by reviewing their compatibility with novel security concepts or challenges such as data tagging, hybrid data security algorithms, microservices deployment using Docker or serverless applications","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126948903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Security of Smart Grids in the Context of Big Data and Machine Learning","authors":"D. Dogaru, I. Dumitrache","doi":"10.1109/CSCS.2019.00018","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00018","url":null,"abstract":"The power system can be seen as a cyber-physical system where big data plays a major role in managing the overwhelming volume of data underlining the importance of big data in both the power industry and security domain. In this article, it is presented the challenges of cyber security in power systems and machine learning techniques, like artificial neural networks, to prevent and overcome cyber-attacks. The motivation for choosing this topic resides in the evolution of power systems with the need for cyber security implementation.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122413595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Brain-Computer Interface: Challenges and Research Perspectives","authors":"R. Lupu, F. Ungureanu, Corina Cimpanu","doi":"10.1109/CSCS.2019.00071","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00071","url":null,"abstract":"Nowadays, the interest in the Brain-Computer Interfacing (BCI) domain is continuously growing, only judging by the number of BCI related papers published or presented in neuro-engineering or neuroscience journals, conferences or workshops. In all these studies, brain activity is considered as a simple modality of providing a system or a device with knowledge from human interactions. Although this simple transfer of information represents a significant development since BCI also integrates brain signals with data from sources like speech, eye gaze, gestures, facial expressions, body postures or physiological measures like heart rate, blood pressure or electrodermal activity. This fusion creates a context-aware and a context-dependent interpretation of the brain signals but represents in the same time a challenge for the neuroscience researchers that must process and represent all this data for clinical or non-clinical applications. BCI has become an addictive and powerful research domain offering a wide range of applications from cognitive load in educational tasks and gaming to automotive and assistive technology. This paper aims to outline current trends in brain-computer interface development and research from the perspective of the authors' experience and scientific literature.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126104033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Arghira, I. Fagarasan, Cristina Nichiforov, S. S. Iliescu, Iulia Stamatescu, V. Calofir, N. Ignat
{"title":"Demand Dispatch for the Distribution Grid – A Proposal for the Romanian Power System","authors":"N. Arghira, I. Fagarasan, Cristina Nichiforov, S. S. Iliescu, Iulia Stamatescu, V. Calofir, N. Ignat","doi":"10.1109/CSCS.2019.00061","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00061","url":null,"abstract":"The paper presents the demand dispatch (DD) concept and applications after a thorough analysis of the main studies in the field. From distribution system operator (DSO)/utility perspective, a main DD classification split was observed: energy price strategies and incentives strategies. On the consumer side, DD methods can be divided into two control options: load shifting and load shedding, with different control approaches. At the distribution grid level, a demand dispatch control framework was proposed. A multi-criteria optimization problem was formulated, considering the 3 involved actors: the utility, the energy market and the consumer. The testing scenario was built, based on the Romanian power system context with data considered from the transport operator and the energy market.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124712700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Vital Signs Using Inertial Measurement Unit Sensors in Military Applications","authors":"Alexandru Cismas, Eduard Cismas, D. Popescu","doi":"10.1109/CSCS.2019.00022","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00022","url":null,"abstract":"Soldiers are subjected during the mission to death threats. Moreover, the medical crew when they need to intervene takes very high risks being forced to move through cross-fire. Being aware of the status of every soldier in battle gives a great advantage in terms of prioritization. Besides the military applications, there is a visible need of new methods of determination of the vital signs. Discovering such new methods offers the advantage of versatility. Wearables will no longer be constrained by where they should be worn, or there will be enough methods of analyzing the vital signs that it will be easier to find a method of wearing it that suits the need. Because the IMU sensors are used in every device that consists of a movement analyzing feature, searching for new applications to use them brings a big gain. In this paper, we analyze the possibilities of using IMU sensors in detecting the vital signs of a person, and the results obtained will represent a starting point for the implementation of a solution for monitoring the vital signs of soldiers.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"AES-7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126513241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Nica, Mihai Trăscău, Alexandru Andrei Rotaru, C. Andreescu, Alexandru Sorici, A. Florea, Vlad Bacue
{"title":"Collecting and Processing a Self-Driving Dataset in the UPB Campus","authors":"A. Nica, Mihai Trăscău, Alexandru Andrei Rotaru, C. Andreescu, Alexandru Sorici, A. Florea, Vlad Bacue","doi":"10.1109/CSCS.2019.00041","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00041","url":null,"abstract":"Although there is a diversity of publicly available datasets for autonomous driving, from small-scale to larger collections with thousands of miles of driving, we consider that the process of collecting and processing them is often overlooked in the literature. From a data-driven perspective, quality of a dataset has proven as important as quantity especially when evaluating self-driving technologies where safety is crucial. In this paper, we provide a guideline going through all the steps from configuring the hardware setup to obtaining a clean dataset. We describe the data collection scenario design, the hardware and software employed in the process, the challenges that must be considered, data filtering and validation stage. This work stems from our experience in collecting the UPB campus driving dataset released together with this work. It is our belief that having a clean and efficient process of collecting a small but meaningful dataset has the potential to improve benchmarking autonomous driving solutions, capturing local environment particularities.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126597814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Giorgiana Cristescu, R. Dobrescu, Oana Chenaru, G. Florea
{"title":"DEW: A New Edge Computing Component for Distributed Dynamic Networks","authors":"Giorgiana Cristescu, R. Dobrescu, Oana Chenaru, G. Florea","doi":"10.1109/CSCS.2019.00100","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00100","url":null,"abstract":"The paper proposes the introduction of a new component in the family of distributed computer networks, with specific functions for edge computing devices. The DEW component is a network layer located between Fog and Edge, a position currently attributed to the Mist concept. Specifically, DEW is designed as a Mist counterpart that can be used in Distributed Dynamical Networks (DDN). The DEW characteristics and the associated specific algorithms are discussed on a particular type of DDN - microgrids and microgrids clusters.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122303632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nonlinear Identification and Controller Design for the Air Levitation System","authors":"M. Schaefer, Daniel Escobar, H. Roth","doi":"10.1109/CSCS.2019.00011","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00011","url":null,"abstract":"This paper presents an alternative method for modeling the air levitation system using nonlinear identification, to overcome common mismatches between simulation and the real system. The proposed controller pursues to compensate the nonlinearities present in the system, allowing the design of classical PID controller. Within the results are presented the behavioral comparison between a nonlinear and a linear identified system. The presented approach aims to use available simulation tools, so that the results can be included as part of laboratory experiments.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133619523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Suspicious Connections on Android Mobile Devices","authors":"Dragos Costea, N. Tapus","doi":"10.1109/CSCS.2019.00058","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00058","url":null,"abstract":"Mobile devices are vulnerable to becoming part of botnet operations just as any other computing device. Attackers use domain generation algorithms to increase their chance of controlling a mobile device. In order to harden a user's defense against such an attack, this paper proposes a method for inspecting outgoing connections. By inspecting DNS packets that are transferred between the mobile device and the Internet, domain names are extracted and classified as legit or suspicious based on specific lexical features inspired from existing literature. Packet inspection is done without superuser privilege and with minimal user interaction. The solution displays the connections established by a mobile devices with and without the user's consent. Performance analysis on the packet inspection process was done to understand and visualize the CPU and memory usage together with the impact on user experience.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132482253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Size Adaptation of Separable Dictionary Learning with Information-Theoretic Criteria","authors":"Andra Baltoiu, B. Dumitrescu","doi":"10.1109/CSCS.2019.00009","DOIUrl":"https://doi.org/10.1109/CSCS.2019.00009","url":null,"abstract":"In sparse representation problems, the size of the dictionary is critical to the performance of the learning algorithm and, apart from loose guidelines concerning dictionary integrity, there is little indication on how to determine the optimal size. Information-theoretic criteria (ITC), used generally for model selection, have recently been employed for the task. This paper extends the work for the case of separable dictionaries, by modifying the Extended Renormalized Maximum Likelihood criterion to the 2D model and proposes an adaptation algorithm that almost entirely relies on the ITC score. Results in terms of mean size recovery rates are within 1 atom away from the true size, while representation errors are consistently below those obtained when applying dictionary learning with the known size.","PeriodicalId":352411,"journal":{"name":"2019 22nd International Conference on Control Systems and Computer Science (CSCS)","volume":"41 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116734362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}