To see the other types of publications on this topic, follow the link: Server-side detection.

Journal articles on the topic 'Server-side detection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Server-side detection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Cohen, Yehonatan, and Danny Hendler. "Scalable Detection of Server-Side Polymorphic Malware." Knowledge-Based Systems 156 (September 2018): 113–28. http://dx.doi.org/10.1016/j.knosys.2018.05.024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mitterhofer, Stefan, Christopher Kruegel, Engin Kirda, and Christian Platzer. "Server-Side Bot Detection in Massively Multiplayer Online Games." IEEE Security & Privacy Magazine 7, no. 3 (May 2009): 29–36. http://dx.doi.org/10.1109/msp.2009.78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ntantogian, Christoforos, Panagiotis Bountakas, Dimitris Antonaropoulos, Constantinos Patsakis, and Christos Xenakis. "NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitation." Journal of Information Security and Applications 58 (May 2021): 102752. http://dx.doi.org/10.1016/j.jisa.2021.102752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shahriar, Hossain, Sarah M. North, YoonJi Lee, and Roger Hu. "Server-side code injection attack detection based on Kullback-Leibler distance." International Journal of Internet Technology and Secured Transactions 5, no. 3 (2014): 240. http://dx.doi.org/10.1504/ijitst.2014.065184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kim, Sangdon, Daeyeol Moon, Hyung-Woo Lee, Jae Deok Lim, and Jeong Nyeo Kim. "Server-Side Polymorphic Malicious Apps Detection System on Android Mobile Devices." Advanced Science Letters 21, no. 3 (March 1, 2015): 229–37. http://dx.doi.org/10.1166/asl.2015.5783.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kamble, Madhubala. "Calorie Detection of Food Image based on SVM Algorithm." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 20, 2021): 1836–40. http://dx.doi.org/10.22214/ijraset.2021.35419.

Full text
Abstract:
Nowadays, standard intake of healthy food is vital for keeping a diet to avoid obesity within the human body . In this paper, we present a totally unique system supported machine learning that automatically performs accurate classification of food images and estimates food attributes. This paper proposes a machine learning model consisting of a support vector machine that classifies food into specific categories within the training a part of the prototype system. The most purpose of the proposed method is to reinforce the accuracy of the pre-training model. The paper designs a prototype system supported the client server network model. The client sends an image detection request and processes it on the server side. The prototype system is meant with three main software components, including a pre-trained support vector machine training module for classification purposes, a text data training module for attribute estimation models, and a server-side module. We experimented with a selection of food categories, each containing thousands of images, and therefore the machine learning training to understand higher classification accuracy.
APA, Harvard, Vancouver, ISO, and other styles
7

Tung, Shu Chu, Wu Jeng Li, and Shih Miao Huang. "Home Security Service and Condition Control." Applied Mechanics and Materials 479-480 (December 2013): 661–64. http://dx.doi.org/10.4028/www.scientific.net/amm.479-480.661.

Full text
Abstract:
This research creates home security service with social interaction based on a web-based multiple stations supervisory control framework. An Arduino controller is used as a thin-controller to control a home security system. Most control laws are computed in server-side, driving commands are transferred to local controllers for execution. A supervisory control server kept in a company can serve numerous Arduino controllers to provide home security service. The Arduino controller can sense door switch, motion detection, smoke detection, gas detection, CO detection, and an emergency button, and can drive door lock, two relays. Besides, RFID is used to help personnel in/out management and alert enable/disable. The controller reads inputs, uploads input/output data to the supervisory server, executes commands from the server, and drives output continuously. Once a controller is connected to the supervisory server, it can be monitored and controlled remotely. Condition control is proposed for the framework to help program control laws for Arduino controllers. In condition control, conditions are set. When some condition is met, certain actions are taken. There are three types of conditions; time condition, input/output condition, and location condition. And there are three kinds of actions; SMS notification, email notification, and output drive. Conditions, actions and their connections are set by system users in a browser with the help of the supervisory control information management system. The control laws set in the condition control are executed in server-side. User of the home security system can open the read/write rights of his input/output points to other users. With appropriate control law, a motion detection signal of one user can activate the alarm of another user. Therefore, the home security service is not just a security for users home, but a security for a social group.
APA, Harvard, Vancouver, ISO, and other styles
8

Hudda, Shreeram. "Uninterrupted VPN Connection Service with Mobility Management and Dead Peer Detection." Defence Science Journal 71, no. 4 (July 1, 2021): 556–63. http://dx.doi.org/10.14429/dsj.71.15623.

Full text
Abstract:
The VPN technology is used to connect client devices securely over unsecured public networks. The Connection handover and Dead Peer Detection (DPD) are the most challenging and important tasks in VPN. In this present article, a solution for connection handover is proposed which covers the pre-authentication with new credentials for a mobile device prior to connection handover. In VPN, a case where such connection handover is failed due to incomplete connection handover or several unusual events which make a VPN client to become offline or dead. To address DPD issues a solution is proposed which includes a Keep Alive Timer (KAT) server at the VPN server side. This proposed solution for DPD is far better than an already existing solution that uses a DNS server for DPD since the DNS server faces several attacks consistently. Thus, the proposed solution for DPD is more secure against such vulnerable attacks.
APA, Harvard, Vancouver, ISO, and other styles
9

Khazal, Iman, and Mohammed Hussain. "Server Side Method to Detect and Prevent Stored XSS Attack." Iraqi Journal for Electrical and Electronic Engineering 17, no. 2 (August 12, 2021): 58–65. http://dx.doi.org/10.37917/ijeee.17.2.8.

Full text
Abstract:
Cross-Site Scripting (XSS) is one of the most common and dangerous attacks. The user is the target of an XSS attack, but the attacker gains access to the user by exploiting an XSS vulnerability in a web application as Bridge. There are three types of XSS attacks: Reflected, Stored, and Dom-based. This paper focuses on the Stored-XSS attack, which is the most dangerous of the three. In Stored-XSS, the attacker injects a malicious script into the web application and saves it in the website repository. The proposed method in this paper has been suggested to detect and prevent the Stored-XSS. The prevent Stored-XSS Server (PSS) was proposed as a server to test and sanitize the input to web applications before saving it in the database. Any user input must be checked to see if it contains a malicious script, and if so, the input must be sanitized and saved in the database instead of the harmful input. The PSS is tested using a vulnerable open-source web application and succeeds in detection by determining the harmful script within the input and prevent the attack by sterilized the input with an average time of 0.3 seconds.
APA, Harvard, Vancouver, ISO, and other styles
10

Dalai, Asish Kumar, and Sanjay Kumar Jena. "Neutralizing SQL Injection Attack Using Server Side Code Modification in Web Applications." Security and Communication Networks 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/3825373.

Full text
Abstract:
Reports on web application security risks show that SQL injection is the top most vulnerability. The journey of static to dynamic web pages leads to the use of database in web applications. Due to the lack of secure coding techniques, SQL injection vulnerability prevails in a large set of web applications. A successful SQL injection attack imposes a serious threat to the database, web application, and the entire web server. In this article, the authors have proposed a novel method for prevention of SQL injection attack. The classification of SQL injection attacks has been done based on the methods used to exploit this vulnerability. The proposed method proves to be efficient in the context of its ability to prevent all types of SQL injection attacks. Some popular SQL injection attack tools and web application security datasets have been used to validate the model. The results obtained are promising with a high accuracy rate for detection of SQL injection attack.
APA, Harvard, Vancouver, ISO, and other styles
11

Estrada-Solano, Felipe, Oscar M. Caicedo, and Nelson L. S. Da Fonseca. "NELLY: Flow Detection Using Incremental Learning at the Server Side of SDN-Based Data Centers." IEEE Transactions on Industrial Informatics 16, no. 2 (February 2020): 1362–72. http://dx.doi.org/10.1109/tii.2019.2947291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Widagdo, Gede Barkah. "Real-Time Early Detection NTP Amplification Attack." ACMIT Proceedings 3, no. 1 (March 18, 2019): 76–84. http://dx.doi.org/10.33555/acmit.v3i1.29.

Full text
Abstract:
This paper is the initials of DDoS mitigation, the goal of this research is to detect NTP Amplification as early as possible so that the victim have a data to do further eskalation process. We knows that the goal of the attacker using NTP Amplification Attack is to exhaust the bandwidth of the victim, in this research also simulate an NTP amplification scenario and detection method; the scenario is the attacker sends requests with spoofed IP MONLIST victim to the compromised NTP server NTP server then responds the large volumes of traffic (amplified traffic) towards Victim to consume the bandwidth so as the legitimate user could not access the services. We put DDoS detection device side of the victim, we combine several monitoring tools to detect NTP amplification i.e bandwidth gauge and netflow analyzer. Netflow analyzer (flow analysis) conduct analysis IP packet header that is sent by the router as a flow-exporter. In our experiment, we could perform early detection of the NTP amplification less than 2 minute.
APA, Harvard, Vancouver, ISO, and other styles
13

Steinhauser, Antonín, and Petr Tůma. "DjangoChecker: Applying extended taint tracking and server side parsing for detection of context-sensitive XSS flaws." Software: Practice and Experience 49, no. 1 (October 23, 2018): 130–48. http://dx.doi.org/10.1002/spe.2649.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Shachi, Mehjabeen, Nurnaby Siddiqui Shourav, Abu Syeed Sajid Ahmed, Afsana Afrin Brishty, and Nazmus Sakib. "A Survey on Detection and Prevention of SQL and NoSQL Injection Attack on Server-side Applications." International Journal of Computer Applications 183, no. 10 (June 21, 2021): 1–7. http://dx.doi.org/10.5120/ijca2021921396.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Almutairi, Suzan, Saoucene Mahfoudh, Sultan Almutairi, and Jalal S. Alowibdi. "Hybrid Botnet Detection Based on Host and Network Analysis." Journal of Computer Networks and Communications 2020 (January 22, 2020): 1–16. http://dx.doi.org/10.1155/2020/9024726.

Full text
Abstract:
Botnet is one of the most dangerous cyber-security issues. The botnet infects unprotected machines and keeps track of the communication with the command and control server to send and receive malicious commands. The attacker uses botnet to initiate dangerous attacks such as DDoS, fishing, data stealing, and spamming. The size of the botnet is usually very large, and millions of infected hosts may belong to it. In this paper, we addressed the problem of botnet detection based on network’s flows records and activities in the host. Thus, we propose a general technique capable of detecting new botnets in early phase. Our technique is implemented in both sides: host side and network side. The botnet communication traffic we are interested in includes HTTP, P2P, IRC, and DNS using IP fluxing. HANABot algorithm is proposed to preprocess and extract features to distinguish the botnet behavior from the legitimate behavior. We evaluate our solution using a collection of real datasets (malicious and legitimate). Our experiment shows a high level of accuracy and a low false positive rate. Furthermore, a comparison between some existing approaches was given, focusing on specific features and performance. The proposed technique outperforms some of the presented approaches in terms of accurately detecting botnet flow records within Netflow traces.
APA, Harvard, Vancouver, ISO, and other styles
16

Sheng, Shi Yue, Jian Yi, and Qing Yuan Zhu. "Data Transmission System Design for Environmental Monitoring System Based on 3G Network." Advanced Materials Research 846-847 (November 2013): 831–35. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.831.

Full text
Abstract:
As the accelerated development of the existing mobile communications and Internet integration, high-speed mobile access and Internet Protocol-based service become mature for different kinds of applications, which provide a great convenience for the remote wireless monitoring, mobile data transmission and so on. In this paper, an environmental monitoring data transmission system based on 3G networks is designed to transmit environmental data which is collected through sensors to server-side. The data transmission system is functioning with remote data transmission, and monitoring data reviewing at remote terminal any time. Scientific monitoring data can accurately, timely and comprehensively reflect of the various environmental parameters on-site detection status. The system components of environment monitoring platform based on virtual instrument is introduced firstly. Then, the network transmission system scheme based on Socket communication is proposed. Finally, the data transmission between LabVIEW application of monitoring terminal and PHP application of server-side through Socket interface is achieved. This system transmits well, and queries conveniently. It is safe and timely while being applied in environmental monitoring data transmission.
APA, Harvard, Vancouver, ISO, and other styles
17

He, Yukun, Qiang Li, Jian Cao, Yuede Ji, and Dong Guo. "Understanding socialbot behavior on end hosts." International Journal of Distributed Sensor Networks 13, no. 2 (February 2017): 155014771769417. http://dx.doi.org/10.1177/1550147717694170.

Full text
Abstract:
Server-side socialbot detection approaches can identify malicious accounts and spams in online social networks. However, they cannot detect socialbot processes, residing on user hosts, which control these accounts. Therefore, new approaches are needed to detect socialbots on hosts. The fundamental to design host-side detecting approaches is to gain an insight into the behaviors of socialbots on host. In this article, we analyzed a series of representative socialbots in depth and summarized the typical features of socialbot behaviors. We proposed a new approach to defense against socialbots on end host. The contributions of this article are threefold: (1) our analysis approach can be used for reference during analyzing new socialbots in the future; (2) we provide several behavior features of socialbots on hosts, including network flow through which socialbots communicate with botmasters through the online social network, system calls via which socialbots conduct an activity, and process information of socialbots running on hosts. These features can be used by someone to design approaches to identifying socialbots on a host; (3) our proposed detection approach can effectively distinguish between a socialbot and a benign application on end hosts.
APA, Harvard, Vancouver, ISO, and other styles
18

J. Santhosh Kumar, B., and Kankanala Pujitha. "Web Application Vulnerability Detection Using Hybrid String Matching Algorithm." International Journal of Engineering & Technology 7, no. 3.6 (July 4, 2018): 106. http://dx.doi.org/10.14419/ijet.v7i3.6.14950.

Full text
Abstract:
Application uses URL as contribution for Web Application Vulnerabilities recognition. if the length of URL is too long then it will consume more time to scan the URL (Ain Zubaidah et.al 2014).Existing system can notice the web pages but not overall web application. This application will test for URL of any length using String matching algorithm. To avoid XSS and CSRF and detect attacks that try to sidestep program upheld arrangements by white list and DOM sandboxing techniques (Elias Athanasopoulos et.al.2012). The web application incorporates a rundown of cryptographic hashes of legitimate (trusted) client side contents. In the event that there is a cryptographic hash for the content in the white list. On the off chance that the hash is discovered the content is viewed as trusted or not trusted. This application makes utilization of SHA-1 for making a message process. The web server stores reliable scripts inside div or span HTML components that are attribute as reliable. DOM sandboxing helps in identifying the script or code. Partitioning Program Symbols into Code and Non-code. This helps to identify any hidden code in trusted tag, which bypass web server. Scanning the website for detecting the injection locations and injecting the mischievous XSS assault vectors in such infusion focuses and check for these assaults in the helpless web application( Shashank Gupta et.al 2015).The proposed application improve the false negative rate.
APA, Harvard, Vancouver, ISO, and other styles
19

Periasamy, J. K., and B. Latha. "Secure and duplication detection in cloud using cryptographic hashing method." International Journal of Engineering & Technology 7, no. 1.7 (February 5, 2018): 105. http://dx.doi.org/10.14419/ijet.v7i1.7.9585.

Full text
Abstract:
De-duplication systems are adopting De-duplication strategies such as client side or server side De-duplication.Particularly, in the beginning of cloud storage, data De-duplication techniques happen to add importance to store original volumes of data in the cloud. This technique motivates the enterprise and organization to farm out data storage to cloud service providers, as proof of several case studies was done.Block level de-duplication is used to discover, removes redundancies compare with previously stored information. The file will be separated into smaller segment as given by the system size or uneven size blocks or chunks whatever we need. Using predetermined size of blocks, the system can simplify the computations of block limits, although using uneven size blocks provides improved de-duplication. Secure Cloud introduce a new concept to audit entities with continuation of a Map Reduce cloud, which is used to help the client is easy to make data tags before feeding the data and audit with theprobity of data is analysed and stored in the cloud. the subject of previously finished work is fixed so that the computational load at user or auditor has huge amount of tag making. In accumulation, Secure Cloud also enables secure de-duplication. Perceive that the “validity” measured in Secure Cloud is the deterrence of leakage, the side channel information. In order to check the leakage of such side channel data, the work accept the custom and design a proof of rights protocol amid cloud servers and clients, which permit clients to confirm the cloud servers what they exactly own the object information.
APA, Harvard, Vancouver, ISO, and other styles
20

Xiang, Zuo, Patrick Seeling, and Frank H. P. Fitzek. "You Only Look Once, But Compute Twice: Service Function Chaining for Low-Latency Object Detection in Softwarized Networks." Applied Sciences 11, no. 5 (March 2, 2021): 2177. http://dx.doi.org/10.3390/app11052177.

Full text
Abstract:
With increasing numbers of computer vision and object detection application scenarios, those requiring ultra-low service latency times have become increasingly prominent; e.g., those for autonomous and connected vehicles or smart city applications. The incorporation of machine learning through the applications of trained models in these scenarios can pose a computational challenge. The softwarization of networks provides opportunities to incorporate computing into the network, increasing flexibility by distributing workloads through offloading from client and edge nodes over in-network nodes to servers. In this article, we present an example for splitting the inference component of the YOLOv2 trained machine learning model between client, network, and service side processing to reduce the overall service latency. Assuming a client has 20% of the server computational resources, we observe a more than 12-fold reduction of service latency when incorporating our service split compared to on-client processing and and an increase in speed of more than 25% compared to performing everything on the server. Our approach is not only applicable to object detection, but can also be applied in a broad variety of machine learning-based applications and services.
APA, Harvard, Vancouver, ISO, and other styles
21

Lesko, S. A. "Models and scenarios of implementation of threats for internet resources." Russian Technological Journal 8, no. 6 (December 18, 2020): 9–33. http://dx.doi.org/10.32362/2500-316x-2020-8-6-9-33.

Full text
Abstract:
To facilitate the detection of various vulnerabilities, there are many different tools (scanners) that can help analyze the security of web applications and facilitate the development of their protection. But these tools for the most part can only identify problems, and they are not capable of fixing them. Therefore, the knowledge of the security developer is a key factor in building a secure Web resource. To resolve application security problems, developers must know all the ways and vectors of various attacks in order to be able to develop various protection mechanisms. This review discusses two of the most dangerous vulnerabilities in the field of Web technologies: SQL injections and XSS attacks (cross-site scripting – XSS), as well as specific cases and examples of their application, as well as various approaches to identifying vulnerabilities in applications and threat prevention. Cross-site scripting as well as SQL-injection attacks are related to validating input data. The mechanisms of these attacks are very similar, but in the XSS attacks the user is the victim, and in the SQL injection attacks, the database server of the Web application. In XSS attacks, malicious content is delivered to users by means of a client-side programming language such as JavaScript, while using SQL injection, the SQL database query language is used. At the same time, XSS attacks, unlike SQL injections, harm only the client side leaving the application server operational. Developers should develop security for both server components and the client part of the web application.
APA, Harvard, Vancouver, ISO, and other styles
22

Gatuha, George, and Tao Jiang. "Android Based Naive Bayes Probabilistic Detection Model for Breast Cancer and Mobile Cloud Computing: Design and Implementation." International Journal of Engineering Research in Africa 21 (December 2015): 197–208. http://dx.doi.org/10.4028/www.scientific.net/jera.21.197.

Full text
Abstract:
Mobile phone technology initiatives are revolutionizing healthcare delivery in Africa and other developing countries. M-health services have transformed maternal health, management of communicable diseases such as Ebola and prevention of chronic diseases. Technological innovations in m-health have improved healthcare efficiency and effectiveness as well as extending health services to remote locations in rural African communities. This paper describes a ubiquitous m- health system that is based on the user centric paradigm of Mobile Cloud Computing (MCC) and android medical-data mining techniques. The development of ultra-fast 4G mobile networks and sophisticated smartphones and tablets has brought the cloud computing paradigm to the mobile domain.The system’s client side is based on an android platform for breast bio-data collection; a data mining technique based on Naïve Bayes probabilistic classifier (NBC) algorithm for predicting malignancy in breast tissue and the server-side MCC data storage. Experimental results indicate that the android Naïve Bayes classifier achieves 96.4% accuracy on Wisconsin Breast Cancer (WBC) data from UCI machine learning database.
APA, Harvard, Vancouver, ISO, and other styles
23

Amir, Mochammad Taufiq Ardiansyah, and Yusrila Yeka Kerlooza. "Sistem Pendeteksi Kecelakaan Kendaraan Bermotor Menggunakan Arduino Dan Smartphone Android." Telekontran : Jurnal Ilmiah Telekomunikasi, Kendali dan Elektronika Terapan 8, no. 2 (April 10, 2021): 105–12. http://dx.doi.org/10.34010/telekontran.v8i2.4570.

Full text
Abstract:
Abstract - Many motor vehicle accidents occur in Indonesia. One of the factors causing the high number of accidents is the large number of motorized vehicle users. Accident reporting is currently still hampered by reporting. This research creates an accident reporting system that is fast and automatic to a web server. This study aims to create a system that can report accident locations. Next, the preparation of the machine condition status detection device. And the web server receives the coordinates of the crash site. This system combines an android smart phone with an Arduino microcontroller. In this research, the voltage sensor is used to overcome the motor vehicle battery voltage. Machine condition data transmission status from device to android smart phone using bluetooth HC-05. Accelerometer and GPS sensors on android smartphones are used to check acceleration and location coordinates during an accident. This study uses 4 vehicle conditions while moving. Vehicle traveling normally, sudden brake, front collision and side collision. The speed limit value used in this study is 19.04 m / s2 or 1.94 g. Based on the research results, when the vehicle is running normally there is no significant change in the value of acceleration. In a sudden brake condition, the Y axis of the acceleration sensor decreases in value until the acceleration value is negative. In the hit-front condition, the Y-axis value has increased significantly. Meanwhile, in a side hit condition, the value of the X and Y axes has increased significantly. The front and side crash conditions were tested 10 times each. Front hit conditions were identified as accidents by 80%. While the side hit condition was identified as an accident as much as 100%. Keywords: sensor, accelerometer, accident, GPS, Android smart phone.
APA, Harvard, Vancouver, ISO, and other styles
24

Irazoqui, Gorka, Mehmet Sinan IncI, Thomas Eisenbarth, and Berk Sunar. "Know Thy Neighbor: Crypto Library Detection in Cloud." Proceedings on Privacy Enhancing Technologies 2015, no. 1 (April 1, 2015): 25–40. http://dx.doi.org/10.1515/popets-2015-0003.

Full text
Abstract:
Abstract Software updates and security patches have become a standard method to fix known and recently discovered security vulnerabilities in deployed software. In server applications, outdated cryptographic libraries allow adversaries to exploit weaknesses and launch attacks with significant security results. The proposed technique exploits leakages at the hardware level to first, determine if a specific cryptographic library is running inside (or not) a co-located virtual machine (VM) and second to discover the IP of the co-located target. To this end, we use a Flush+Reload cache side-channel technique to measure the time it takes to call (load) a cryptographic library function. Shorter loading times are indicative of the library already residing in memory and shared by the VM manager through deduplication. We demonstrate the viability of the proposed technique by detecting and distinguishing various cryptographic libraries, including MatrixSSL, PolarSSL, GnuTLS, OpenSSL and CyaSSL along with the IP of the VM running these libraries. In addition, we show how to differentiate between various versions of libraries to better select an attack target as well as the applicable exploit. Our experiments show a complete attack setup scenario with single-trial success rates of up to 90% under light load and up to 50% under heavy load for libraries running in KVM.
APA, Harvard, Vancouver, ISO, and other styles
25

Ali, Qutaiba. "Security Issues of Solar Energy Harvesting Road Side Unit (RSU)." Iraqi Journal for Electrical and Electronic Engineering 11, no. 1 (June 1, 2015): 18–31. http://dx.doi.org/10.37917/ijeee.11.1.3.

Full text
Abstract:
Vehicular network security had spanned and covered a wide range of security related issues. However solar energy harvesting Road Side Unit (RSU) security was not defined clearly, it is this aspect that is considered in this paper. In this work, we will suggest an RSU security model to protect it against different internal and external threats. The main goal is to protect RSU specific data (needed for its operation) as well as its functionality and accessibility. The suggested RSU security model must responds to many objectives, it should ensure that the administrative information exchanged is correct and undiscoverable (information authenticity and privacy), the source (e.g., VANET server) is who he claims to be (message integrity and source authentication) and the system is robust and available (using Intrusion Detection System (IDS)). In this paper, we suggest many techniques to strength RSU security and they were prototyped using an experimental model based on Ubicom IP2022 network processor development kit.
APA, Harvard, Vancouver, ISO, and other styles
26

Chen, Yen-Hung, Yuan-Cheng Lai, and Kai-Zhong Zhou. "Identifying Hybrid DDoS Attacks in Deterministic Machine-to-Machine Networks on a Per-Deterministic-Flow Basis." Micromachines 12, no. 9 (August 26, 2021): 1019. http://dx.doi.org/10.3390/mi12091019.

Full text
Abstract:
The Deterministic Network (DetNet) is becoming a major feature for 5G and 6G networks to cope with the issue that conventional IT infrastructure cannot efficiently handle latency-sensitive data. The DetNet applies flow virtualization to satisfy time-critical flow requirements, but inevitably, DetNet flows and conventional flows interact/interfere with each other when sharing the same physical resources. This subsequently raises the hybrid DDoS security issue that high malicious traffic not only attacks the DetNet centralized controller itself but also attacks the links that DetNet flows pass through. Previous research focused on either the DDoS type of the centralized controller side or the link side. As DDoS attack techniques are evolving, Hybrid DDoS attacks can attack multiple targets (controllers or links) simultaneously, which are difficultly detected by previous DDoS detection methodologies. This study, therefore, proposes a Flow Differentiation Detector (FDD), a novel approach to detect Hybrid DDoS attacks. The FDD first applies a fuzzy-based mechanism, Target Link Selection, to determine the most valuable links for the DDoS link/server attacker and then statistically evaluates the traffic pattern flowing through these links. Furthermore, the contribution of this study is to deploy the FDD in the SDN controller OpenDayLight to implement a Hybrid DDoS attack detection system. The experimental results show that the FDD has superior detection accuracy (above 90%) than traditional methods under the situation of different ratios of Hybrid DDoS attacks and different types and scales of topology.
APA, Harvard, Vancouver, ISO, and other styles
27

Hasan, Mehdi, Fumihiko Yokota, Rafiqul Islam, Kenji Hisazumi, Akira Fukuda, and Ashir Ahmed. "A Predictive Model for Height Tracking in an Adult Male Population in Bangladesh to Reduce Input Errors." International Journal of Environmental Research and Public Health 17, no. 5 (March 10, 2020): 1806. http://dx.doi.org/10.3390/ijerph17051806.

Full text
Abstract:
The advancement of ICT and affordability of medical sensors enable healthcare data to be obtained remotely. Remote healthcare data is erroneous in nature. Detection of errors for remote healthcare data has not been significantly studied. This research aims to design and develop a software system to detect and reduce such healthcare data errors. Enormous research efforts produced error detection algorithms, however, the detection is done at the server side after a substantial amount of data is archived. Errors can be efficiently reduced if the suspicious data can be detected at the source. We took the approach to predict acceptable range of anthropometric data of each patient. We analyzed 40,391 records to monitor the growth patterns. We plotted the anthropometric items e.g., Height, Weight, BMI, Waist and Hip size for males and females. The plots show some patterns based on different age groups. This paper reports one parameter, height of males. We found three groups that can be classified with similar growth patterns: Age group 20–49, no significant change; Age group 50–64, slightly decremented pattern; and Age group 65–100, a drastic height loss. The acceptable range can change over time. The system estimates the updated trend from new health records.
APA, Harvard, Vancouver, ISO, and other styles
28

Ullah, Asad, Jing Wang, M. Shahid Anwar, Arshad Ahmad, Shah Nazir, Habib Ullah Khan, and Zesong Fei. "Fusion of Machine Learning and Privacy Preserving for Secure Facial Expression Recognition." Security and Communication Networks 2021 (January 30, 2021): 1–12. http://dx.doi.org/10.1155/2021/6673992.

Full text
Abstract:
The interest in Facial Expression Recognition (FER) is increasing day by day due to its practical and potential applications, such as human physiological interaction diagnosis and mental disease detection. This area has received much attention from the research community in recent years and achieved remarkable results; however, a significant improvement is required in spatial problems. This research work presents a novel framework and proposes an effective and robust solution for FER under an unconstrained environment; it also helps us to classify facial images in the client/server model along with preserving privacy. There are a lot of cryptography techniques available but they are computationally expensive; on the other side, we have implemented a lightweight method capable of ensuring secure communication with the help of randomization. Initially, we perform preprocessing techniques to encounter the unconstrained environment. Face detection is performed for the removal of excessive background and it detects the face in the real-world environment. Data augmentation is for the insufficient data regime. A dual-enhanced capsule network is used to handle the spatial problem. The traditional capsule networks are unable to sufficiently extract the features, as the distance varies greatly between facial features. Therefore, the proposed network is capable of spatial transformation due to the action unit aware mechanism and thus forwards the most desiring features for dynamic routing between capsules. The squashing function is used for classification purposes. Simple classification is performed through a single party, whereas we also implemented the client/server model with privacy measurements. Both parties do not trust each other, as they do not know the input of each other. We have elaborated that the effectiveness of our method remains unchanged by preserving privacy by validating the results on four popular and versatile databases that outperform all the homomorphic cryptographic techniques.
APA, Harvard, Vancouver, ISO, and other styles
29

Tang, Kai, and Lian-Juan Huo. "Optimizing Synchronization of Tennis Professional League Live Broadcast Based on Wireless Network Planning." Mobile Information Systems 2021 (June 21, 2021): 1–9. http://dx.doi.org/10.1155/2021/8732115.

Full text
Abstract:
The live broadcast of the common league mainly adopts the design of streaming media data block by block. The secondary processing of streaming data is carried out on the server-side. It results in a higher delay during a live broadcast. The higher delay has numerous disadvantages during broadcasting for delay-sensitive applications. We have to solve the delay problems during a live broadcast. Therefore, in this paper, we optimize the synchronization of the tennis professional league live broadcast based on wireless network planning. In the proposed scheme, the 3D detection target model is first constructed, and the background is extracted from the moving video image. The extraction is performed using the interframe difference elimination algorithm, and the target motion trajectory is predicted. Then the phase difference characteristics of the image foreground trajectory are analyzed by the Hilbert transform to detect target missing points. By observing the vertex structure of the target missing point, the phase Fourier transform frame is constructed. Finally, the synchronization of the league live broadcast is encoded and decoded. Based on the timestamp, the synchronization optimization of the tennis professional league live broadcast is completed. The experimental results show that the synchronization optimization method has good synchronization, high resolution, short reaction time, and good detection effect.
APA, Harvard, Vancouver, ISO, and other styles
30

Alawi, Malik, Stefan Kurtz, and Michael Beckstette. "CASSys: an integrated software-system for the interactive analysis of ChIP-seq data." Journal of Integrative Bioinformatics 8, no. 2 (June 1, 2011): 1–13. http://dx.doi.org/10.1515/jib-2011-155.

Full text
Abstract:
Summary The mapping of DNA-protein interactions is crucial for a full understanding of transcriptional regulation. Chromatin-immunoprecipitation followed bymassively parallel sequencing (ChIP-seq) has become the standard technique for analyzing these interactions on a genome-wide scale. We have developed a software system called CASSys (ChIP-seq data Analysis Software System) spanning all steps of ChIP-seq data analysis. It supersedes the laborious application of several single command line tools. CASSys provides functionality ranging from quality assessment and -control of short reads, over the mapping of reads against a reference genome (readmapping) and the detection of enriched regions (peakdetection) to various follow-up analyses. The latter are accessible via a state-of-the-art web interface and can be performed interactively by the user. The follow-up analyses allow for flexible user defined association of putative interaction sites with genes, visualization of their genomic context with an integrated genome browser, the detection of putative binding motifs, the identification of over-represented Gene Ontology-terms, pathway analysis and the visualization of interaction networks. The system is client-server based, accessible via a web browser and does not require any software installation on the client side. To demonstrate CASSys’s functionality we used the system for the complete data analysis of a publicly available Chip-seq study that investigated the role of the transcription factor estrogen receptor-α in breast cancer cells.
APA, Harvard, Vancouver, ISO, and other styles
31

Elsagheer Mohamed, Samir A., Mohammad T. Parvez, Khaled A. AlShalfan, Mahmoud Y. Alaidy, Mohammed A. Al-Hagery, and Mohamed T. Ben Othman. "Autonomous Real-Time Speed-Limit Violation Detection and Reporting Systems Based on the Internet of Vehicles (IoV)." Journal of Advanced Transportation 2021 (September 21, 2021): 1–15. http://dx.doi.org/10.1155/2021/9888789.

Full text
Abstract:
Over-/underspeeding is one of the leading causes of road accidents. Traditional systems of detecting and reporting speed-limit violations are not suitable for smart cities. Even the sophisticated conventional systems that use cameras or RFIDs for automating speed-limit violations have several drawbacks, including cost, complexity, reliability, and maintenance. In this paper, we present two systems based on the Internet of Vehicles (IoV) to automatically detect speed-limit violations and autonomously report the committed violations to the authorities. Our systems require no extra hardware or equipment: only the On-Board Unit (OBU), the Road Side Unit (RSU), and the Cloud Server software have to be updated to have a fully functioning system as long as the IoV infrastructure is deployed. One of the systems will be installed on the OBU. A second alternative system design is to use Cloud Servers (CSs) and the IoV beacons that are sent from the vehicles. Additionally, unlike the existing systems installed in specific locations, all roads in the smart cities and highways will be fully monitored. Adaptive fine calculation according to new dynamic policies can be easily integrated into the proposed system. Furthermore, the proposed system can accurately operate in all weather conditions. Moreover, it allows the dynamic adjustment of the speed limits according to the current weather conditions. We have validated the proposed system by building a prototype system that effectively and accurately detects and reports over-/underspeed traffic violations alongside any road.
APA, Harvard, Vancouver, ISO, and other styles
32

Gao, Jinxia, Longjun Liu, Peng Gao, Yihuan Zheng, Wenxuan Hou, and Junhui Wang. "Intelligent Occlusion Stabilization Splint with Stress-Sensor System for Bruxism Diagnosis and Treatment." Sensors 20, no. 1 (December 22, 2019): 89. http://dx.doi.org/10.3390/s20010089.

Full text
Abstract:
Bruxism is a masticatory muscle activity characterized by high prevalence, widespread complications, and serious consequences but without specific guidelines for its diagnosis and treatment. Although occlusal force-based biofeedback therapy is proven to be safe, effective, and with few side effects in improving bruxism, its mechanism and key technologies remain unclear. The purpose of this study was to research a real-time, quantitative, intelligent, and precise force-based biofeedback detection device based on artificial intelligence (AI) algorithms for the diagnosis and treatment of bruxism. Stress sensors were integrated and embedded into a resin-based occlusion stabilization splint by using a layering technique (sandwich method). The sensor system mainly consisted of a pressure signal acquisition module, a main control module, and a server terminal. A machine learning algorithm was leveraged for occlusal force data processing and parameter configuration. This study implemented a sensor prototype system from scratch to fully evaluate each component of the intelligent splint. Experiment results showed reasonable parameter metrics for the sensors system and demonstrated the feasibility of the proposed scheme for bruxism treatment. The intelligent occlusion stabilization splint with a stress sensor system is a promising approach to bruxism diagnosis and treatment.
APA, Harvard, Vancouver, ISO, and other styles
33

Wu, Ya-Ping, Yu-Song Lin, Wei-Guo Wu, Cong Yang, Jian-Qin Gu, Yan Bai, and Mei-Yun Wang. "Semiautomatic Segmentation of Glioma on Mobile Devices." Journal of Healthcare Engineering 2017 (2017): 1–10. http://dx.doi.org/10.1155/2017/8054939.

Full text
Abstract:
Brain tumor segmentation is the first and the most critical step in clinical applications of radiomics. However, segmenting brain images by radiologists is labor intense and prone to inter- and intraobserver variability. Stable and reproducible brain image segmentation algorithms are thus important for successful tumor detection in radiomics. In this paper, we propose a supervised brain image segmentation method, especially for magnetic resonance (MR) brain images with glioma. This paper uses hard edge multiplicative intrinsic component optimization to preprocess glioma medical image on the server side, and then, the doctors could supervise the segmentation process on mobile devices in their convenient time. Since the preprocessed images have the same brightness for the same tissue voxels, they have small data size (typically 1/10 of the original image size) and simple structure of 4 types of intensity value. This observation thus allows follow-up steps to be processed on mobile devices with low bandwidth and limited computing performance. Experiments conducted on 1935 brain slices from 129 patients show that more than 30% of the sample can reach 90% similarity; over 60% of the samples can reach 85% similarity, and more than 80% of the sample could reach 75% similarity. The comparisons with other segmentation methods also demonstrate both efficiency and stability of the proposed approach.
APA, Harvard, Vancouver, ISO, and other styles
34

Mortazavi, Mojtaba, Abdolrazagh Barzegar, Abdorrasoul Malekpour, Mohammad Ghorbani, Saeid Gholamzadeh, and Younes Ghasemi. "In Silico Evaluation of the ATP7B Protein: Insights from the Role of Rare Codon Clusters and Mutations that Affect Protein Structure and Function." Current Proteomics 17, no. 3 (March 24, 2020): 213–26. http://dx.doi.org/10.2174/1570164617666190919114545.

Full text
Abstract:
Background: Wilson’s disease is a rare autosomal recessive genetic disorder of copper metabolism, which is characterized by hepatic and neurological disease. ATP7B encodes a transmembrane protein ATPase (ATP7B), which functions as a copper-dependent P-type ATPase. The mutations in the gene ATP7B (on chromosome 13) lead to Wilson’s disease and is highly expressed in the liver, kidney, and placenta. Consequently, this enzyme was considered a special topic in clinical and biotechnological research. For in silico analysis, the 3D molecular modeling of this enzyme was conducted in the I-TASSER web server. Methods: For a better evaluation, the important characteristics of this enzyme such as the rare codons of the ATP7B gene were evaluated by online software, including a rare codon calculator (RCC), ATGme, LaTcOm, and Sherlocc program. Additionally, the multiple sequence alignment of this enzyme was studied. Finally, for evaluation of the effects of rare codons, the 3D structure of ATP7B was modeled in the Swiss Model and I-TASSER web server. Results: The results showed that the ATP7B gene has 35 single rare codons for Arg. Additionally, RCC detected two rare codons for Leu, 13 single rare codons for Ile and 28 rare codons for the Pro. ATP7B gene analysis in minmax and sliding_window algorithm resulted in the identification of 16 and 17 rare codon clusters, respectively, indicating the different features of these algorithms in the detection of RCCs. Analyzing the 3D model of ATP7B protein showed that Arg816 residue constitutes hydrogen bonds with Glu810 and Glu816. Mutation of this residue to Ser816 cause these hydrogen bonds not to be formed and may interfere in the proper folding of ATP7B protein. Furthermore, the side chain of Arg1228 does not form any bond with other residues. By mutation of Arg1228 to Thr1228, a new hydrogen bond is formed with the side chain of Arg1228. The addition and deletion of hydrogen bonds alter the proper folding of ATP7B protein and interfere with the proper function of the ATP7B position. On the other hand, His1069 forms the hydrogen bonds with the His880 and this hydrogen bond adhere two regions of the protein together, which is critical in the final structural folding of ATP7B protein. Conclusion: Previous studies show that synonymous and silent mutations have been linked to numerous diseases. Given the importance of synonymous and silent mutations in diseases, the aim of this study was to investigate the rare codons (synonymous codons) in the structure of ATP7B enzyme. By these analyses, a new understanding was developed and our findings can further be used in some fields of the clinical and industrial biotechnology.
APA, Harvard, Vancouver, ISO, and other styles
35

Szankasi, Philippe, Jonathan Schumacher, and Todd W. Kelley. "An Inexpensive Ion Torrent-Based Deep Sequencing Assay Demonstrates Marked Superiority Over Sanger Sequencing For Routine Detection Of BCR-ABL1 Kinase Domain Mutations." Blood 122, no. 21 (November 15, 2013): 2722. http://dx.doi.org/10.1182/blood.v122.21.2722.2722.

Full text
Abstract:
Abstract Background The accurate detection of BCR-ABL1 kinase domain (KD) mutations is important for appropriate clinical management of CML patients on tyrosine kinase inhibitor therapy. Sanger sequencing (SS) is widely used for the clinical analysis of KD mutations. However, SS is relatively insensitive and mutant levels of approximately 15-20% are necessary for detection by this technique. Furthermore, it is not possible to determine whether or not two or more detected mutations are in the same subpopulation (in-cis; so-called composite mutations) or in separate subpopulations (in-trans). In order to validate the feasibility and potential advantages of next generation sequencing (NGS) for detecting BCR-ABL1KD mutations in a large volume clinical hematology reference laboratory, we developed an NGS assay on the Ion Torrent PGM platform (IT-NGS) and conducted a side-by-side comparison to SS in a series of clinical samples. Methods 101 clinical samples that were evaluated for BCR-ABL1 KD mutations at our institution were collected from the archives. Of these, 74 were positive and 27 were negative for KD mutations by SS. 30 of 74 positive cases demonstrated 2 or more mutations by SS. These samples were subjected to a BCR-ABL1KD sequencing assay by IT-NGS then analyzed using Ion Torrent Server software, an off-the-shelf tool for the calling of sequence variants. All mutations that were detected by IT-NGS were quantitated. The sensitivity for detecting mutations by this method was validated to 4% and this was set as the threshold for variant calling. Results 100% of mutations that were detected by SS were also detected by IT-NGS. 11 of 74 positive cases (14.9%) demonstrated an additional 15 mutations by IT-NGS (range of mutation frequency = 4-21%) that were not previously detected by SS. This included 4 of 74 cases with 2 additional mutations. Two cases demonstrated mutations by IT-NGS that were not detected by SS because they were outside the range of coverage of the SS assay. In total, the 74 positive samples had 108 mutations detectable by SS and 125 mutations detectable by IT-NGS. 39 cases demonstrated 2 or more mutations by IT-NGS. In 32 of these 39 cases, it was possible to conclude the cis/trans configuration of specific mutation pairs, information that cannot be obtained from SS data. 16 total mutation pairs were in-cis and 17 mutation pairs were in-trans (1 case with 4 mutations had a pair which was in-cis and a pair which was in-trans). The ability to determine cis/transconfiguration was dependent upon whether or not multiple mutations were close enough in the sequence to be present in the same NGS reads. Of the 27 SS-negative cases, 1 demonstrated a low-level mutation (Y253F; 5.5%) missed by SS and three cases demonstrated low-level mutations outside the range of the SS assay. The total cost per sample for IT-NGS was comparable to SS when 10+ samples were multiplexed. Conclusions 1. We describe an NGS-based BCR-ABL1 KD sequencing assay that is suitable, in terms of cost and performance, for routine use in a clinical hematology laboratory. 2. Data generated by this assay demonstrates that lower level mutations not detectable by SS (<20%) often accompany high-level mutations. 3. Information about the underlying complexity of BCR-ABL1 KD mutations is achievable in the context of routine clinical testing using these methods. Disclosures: No relevant conflicts of interest to declare.
APA, Harvard, Vancouver, ISO, and other styles
36

Hansen, J. E., O. Lund, J. Engelbrecht, H. Bohr, J. O. Nielsen, J. E. S. Hansen, and S. Brunak. "Prediction of O-glycosylation of mammalian proteins: specificity patterns of UDP-GalNAc:polypeptide N-acetylgalactosaminyltransferase." Biochemical Journal 308, no. 3 (June 15, 1995): 801–13. http://dx.doi.org/10.1042/bj3080801.

Full text
Abstract:
The specificity of the enzyme(s) catalysing the covalent link between the hydroxyl side chains of serine or threonine and the sugar moiety N-acetylgalactosamine (GalNAc) is unknown. Pattern recognition by artificial neural networks and weight matrix algorithms was performed to determine the exact position of in vivo O-linked GalNAc-glycosylated serine and threonine residues from the primary sequence exclusively. The acceptor sequence context for O-glycosylation of serine was found to differ from that of threonine and the two types were therefore treated separately. The context of the sites showed a high abundance of proline, serine and threonine extending far beyond the previously reported region covering positions -4 through +4 relative to the glycosylated residue. The O-glycosylation sites were found to cluster and to have a high abundance in the N-terminal part of the protein. The sites were also found to have an increased preference for three different classes of beta-turns. No simple consensus-like rule could be deduced for the complex glycosylation sequence acceptor patterns. The neural networks were trained on the hitherto largest data material consisting of 48 carefully examined mammalian glycoproteins comprising 264 O-glycosylation sites. For detection neural network algorithms were much more reliable than weight matrices. The networks correctly found 60-95% of the O-glycosylated serine/threonine residues and 88-97% of the non-glycosylated residues in two independent test sets of known glycoproteins. A computer server using E-mail for prediction of O-glycosylation sites has been implemented and made publicly available. The Internet address is NetOglyc@cbs.dtu.dk.
APA, Harvard, Vancouver, ISO, and other styles
37

Oláh, László, Hiroyuki K. M. Tanaka, Gergő Hamar, and Dezső Varga. "Muographic Observation of Density Variations in the Vicinity of Minami-Dake Crater of Sakurajima Volcano." Journal of Disaster Research 14, no. 5 (August 1, 2019): 701–12. http://dx.doi.org/10.20965/jdr.2019.p0701.

Full text
Abstract:
Muography is an innovative imaging technique used for inspecting and monitoring density-length variations of large-sized natural or human-made objects based on the measurement of the absorption rate of cosmic-ray muons. The first large-sized, high-resolution muography observatory based on Multi-Wire Proportional Chamber (MWPC) technology is being developed to monitor the mass density variations in the vicinity of Minami-dake crater of Sakurajima volcano. We found that the track rates provided by five ongoing tracking systems with a total surface area of 4 m2 are stable within ±3% from the backward direction, which demonstrates that the MWPC-based Muographic Observation System (MMOS) is applicable for the detection of average density variations above 2%, which is well below the practical limit of 5%. We quantified the time resolution of the designed muography observatory by modeling the muon flux across the volcano; the average density-length variation of 5 (10)% is expected to be detected within 5–20 (2–8) days at a 1σ (68%) confidence level (CL) with an MMOS orientation of 10.86° above the horizon. An automated analysis framework was developed as a data base for raw data reconstruction, analysis, and preparation, and which is accessible via web-server. We observed a more than 2σ CL decrease in average density across the West side of Crater A during the ongoing data collection period. The observed density decrease suggests that the amount of material has decreased inside Crater A due to the consecutive eruptions of Minami-dake during the data collection period from November 30, 2018 to January 11, 2019.
APA, Harvard, Vancouver, ISO, and other styles
38

Lee, Han Seong, and Hyung-Woo Lee. "Dynamic Analysis System for Detecting Remote Server-Side Polymorphic Malicious Mobile Apps on Android based Smartphone." International Journal of u- and e-Service, Science and Technology 8, no. 11 (November 30, 2015): 295–302. http://dx.doi.org/10.14257/ijunesst.2015.8.11.29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Hao, Na, Fan Bai, and Tian Qing Chang. "Design and Implementation of Network Reliability for Intelligent Fire Control Training System." Advanced Materials Research 479-481 (February 2012): 1974–77. http://dx.doi.org/10.4028/www.scientific.net/amr.479-481.1974.

Full text
Abstract:
In the detailed analysis of the data transmission needs of the intelligent fire control training system, the network management is modeled based on Unified Modeling Language (UML). In order to improve the reliability of network transmission, authentication part is designed in the server side, and a connected state detecting method is proposed, which is based on heartbeat mechanism and with data-carrying. Test results show that the network system has got higher reliability while satisfying the real-time constraints. It can provide certain valuable reference to network system designing of the similar corresponding systems.
APA, Harvard, Vancouver, ISO, and other styles
40

Hudec, Robert, Slavomír Matúška, Patrik Kamencay, and Miroslav Benco. "A Smart IoT System for Detecting the Position of a Lying Person Using a Novel Textile Pressure Sensor." Sensors 21, no. 1 (December 31, 2020): 206. http://dx.doi.org/10.3390/s21010206.

Full text
Abstract:
Bedsores are one of the severe problems which could affect a long-term lying subject in the hospitals or the hospice. To prevent lying bedsores, we present a smart Internet of Things (IoT) system for detecting the position of a lying person using novel textile pressure sensors. To build such a system, it is necessary to use different technologies and techniques. We used sixty-four of our novel textile pressure sensors based on electrically conductive yarn and the Velostat to collect the information about the pressure distribution of the lying person. Using Message Queuing Telemetry Transport (MQTT) protocol and Arduino-based hardware, we send measured data to the server. On the server side, there is a Node-RED application responsible for data collection, evaluation, and provisioning. We are using a neural network to classify the subject lying posture on the separate device because of the computation complexity. We created the challenging dataset from the observation of twenty-one people in four lying positions. We achieved a best classification precision of 92% for fourth class (right side posture type). On the other hand, the best recall (91%) for first class (supine posture type) was obtained. The best F1 score (84%) was achieved for first class (supine posture type). After the classification, we send the information to the staff desktop application. The application reminds employees when it is necessary to change the lying position of individual subjects and thus prevent bedsores.
APA, Harvard, Vancouver, ISO, and other styles
41

Alexander, Geoffrey, Antonio M. Espinoza, and Jedidiah R. Crandall. "Detecting TCP/IP Connections via IPID Hash Collisions." Proceedings on Privacy Enhancing Technologies 2019, no. 4 (October 1, 2019): 311–28. http://dx.doi.org/10.2478/popets-2019-0071.

Full text
Abstract:
Abstract We present a novel attack for detecting the presence of an active TCP connection between a remote Linux server and an arbitrary client machine. The attack takes advantage of side-channels present in the Linux kernel’s handling of the values used to populate an IPv4 packet’s IPID field and applies to kernel versions of 4.0 and higher. We implement and test this attack and evaluate its real world effectiveness and performance when used on active connections to popular web servers. Our evaluation shows that the attack is capable of correctly detecting the IP-port 4-tuple representing an active TCP connection in 84% of our mock attacks. We also demonstrate how the attack can be used by the middle onion router in a Tor circuit to test whether a given client is connected to the guard entry node associated with a given circuit. In addition we discuss the potential issues an attacker would face when attempting to scale it to real world attacks, as well as possible mitigations against the attack. Our attack does not exhaust any global resource, and therefore challenges the notion that there is a direct one-to-one connection between shared, limited resources and non-trivial network side-channels. This means that simply enumerating global shared resources and considering the ways in which they can be exhausted will not suffice for certifying a kernel TCP/IP network stack to be free of privacy risk side-channels.
APA, Harvard, Vancouver, ISO, and other styles
42

Khudhur, Dhuha Dheyaa, and Muayad Sadik Croock. "Developed security and privacy algorithms for cyber physical system." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 6 (December 1, 2021): 5379. http://dx.doi.org/10.11591/ijece.v11i6.pp5379-5389.

Full text
Abstract:
Cyber-physical system (CPS) is a modern technology in the cyber world, and it integrates with wireless sensor network (WSN). This system is widely used in many applications such as a smart city, greenhouse, healthcare, and power grid. Therefore, the data security and integrity are necessary to ensure the highest level of protection and performance for such systems. In this paper, two sides security system for cyber-physical level is proposed to obtain security, privacy, and integrity. The first side is applied the secure sockets layer (SSL)/transport layer security (TLS) encryption protocol with the internet of things (IoT) based message queuing telemetry transport (MQTT) protocol to secure the connection and encrypt the data exchange between the system's parties. The second side proposes an algorithm to detect and prevent a denial of service (DoS) attack (hypertext transfer protocol (HTTP) post request) on a Web server. The experiment results show the superior performance of the proposed method to secure the CPS by detecting and preventing the cyber-attacks, which infect the Web servers. They also prove the implementation of security, privacy and integrity aspects on the CPS.
APA, Harvard, Vancouver, ISO, and other styles
43

O., Sarjiyus, and El-Yakub M. B. "Neutralizing SQL Injection Attack on Web Application Using Server Side Code Modification." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, May 1, 2019, 158–73. http://dx.doi.org/10.32628/cseit1952339.

Full text
Abstract:
SQL Injection attacks pose a very serious security threat to Web applications and web servers. They allow attackers to obtain unrestricted access to the databases underlying the applications and to the potentially sensitive and important information these databases contain. This research, “Neutralizing SQL Injection attack on web application using server side code modification” proposes a method for boosting web security by detecting SQL Injection attacks on web applications by modification on the server code so as to minimize vulnerability and mitigate fraudulent and malicious activities. This method has been implemented on a simple website with a database to register users with an admin that has control privileges. The server used is a local server and the server code was written with PHP as the back end. The front end was designed using MySQL. PHP server side scripting language was used to modify codes. ‘PDO prepare’ a tool to prepare parameters to be executed. The proposed method proved to be efficient in the context of its ability to prevent all types of SQL injection attacks. Acunetix was used to test the vulnerability of the code, and the code was implemented on a simple website with a simple database. Some popular SQL injection attack tools and web application security datasets have been used to validate the model. Unlike most approaches, the proposed method is quite simple to implement yet highly effective. The results obtained are promising with a high accuracy rate for detection of SQL injection attack.
APA, Harvard, Vancouver, ISO, and other styles
44

"A Framework for Web Application Vulnerability Detection." International Journal of Engineering and Advanced Technology 9, no. 3 (February 29, 2020): 543–49. http://dx.doi.org/10.35940/ijeat.c4778.029320.

Full text
Abstract:
Hardly a facet of human life is not influenced by the Internet due to the continuous proliferation in the Internet facilities, usage, speed, user friendly browsing, global access, etc. At flip side, hackers are also attacking this digital world with new tactics and techniques through exploiting the web application vulnerabilities. The analysis of these vulnerabilities is of paramount importance in direction to secure social digital world. It can be carried out in two ways. First, manual analysis which is error prone due to the human nature of forgiveness, dynamic change in technology and fraudulence attack techniques. Second, through the existing web application vulnerability scanners that sometime may suffer from generating false alarm rate. Hence, there is a need to develop a framework that can detect different levels of vulnerabilities, ranging from client side vulnerabilities, communication side vulnerabilities to server side vulnerabilities. This paper has carried out the literature survey in direction of identifying the new attack vectors, vulnerabilities, detection mechanism, research gaps and new working areas in same field. Continuous improvement in framework is easy. Hence, a framework is proposed to overcome the identified research gap
APA, Harvard, Vancouver, ISO, and other styles
45

"Detecting Cache-Based Side Channel Attacks in IaaS using Enhanced Algorithm." International Journal of Innovative Technology and Exploring Engineering 8, no. 9S4 (October 1, 2019): 227–35. http://dx.doi.org/10.35940/ijitee.i1136.0789s419.

Full text
Abstract:
The Connectivity of the information among people throughout the world is made possible through computers and smart devices connected over the internet. The economic related transactions also happen over the network which needs a secured transaction medium. Therefore, lots of intrusion detection and prevention systems are implemented in order to reduce the impact of the attack. But every year the impact of attack over the shared VMs is being dramatically increased. The economic transactions occur with the help of web applications and they are divided into browser-side and server-side components. One of the major services provided by the cloud environment is Infrastructure-asa-Service in which the virtual machines are used to provide the shared services to the multiple users. Though the VMs are secured by implementing the various security algorithms, one of the attacks, Side-channel attack, uses the leaked information acquired from the implementation of hardware component. Cache-based side channel attack is the serious attack, which tries to steal the sensitive information like credit card details, password, medical related details, etc., by establishing various algorithms like PRIME+PROBE, FLUSH+RELOAD, FLUSH+FLUSH, etc.,. The VM does speculative execution for improving the CPU performance, thus resulting in a scenario which allows the user to access the sensitive data on the cache line. So in this paper the environment is set up with 5 various scenarios with the combinations consisting of attack, no-attack, Full load, Average load and no-load. The Hardware Performance Counters (HPC) is used along with Intel CMT to monitor and distinguish the attacker VM, thus increasing the detection accuracy and reducing the system overhead.
APA, Harvard, Vancouver, ISO, and other styles
46

Jia, Jiyou, and Yunfan He. "The design, implementation and pilot application of an intelligent online proctoring system for online exams." Interactive Technology and Smart Education ahead-of-print, ahead-of-print (May 12, 2021). http://dx.doi.org/10.1108/itse-12-2020-0246.

Full text
Abstract:
Purpose The purpose of this study is to design and implement an intelligent online proctoring system (IOPS) by using the advantage of artificial intelligence technology in order to monitor the online exam, which is urgently needed in online learning settings worldwide. As a pilot application, the authors used this system in an authentic university online exam and checked the proctoring result. Design/methodology/approach The IOPS adopts the B/S (Browser/Server) architecture. The server side is implemented with programming language C and Python and stores the identification data of all examinees and their important behavior change status, including facial expression, eye and mouth movement and speech. The browser side collects and analyzes multimodal data of the examinee writing the online test locally and transfers the examinee’s most important behavior status change data to the server. Real-time face recognition and voice detection are implemented with the support of open-source software. Findings The system was integrated into a Web-based intelligent tutoring system for school mathematics education. As a pilot application, the system was also used for online proctored exam in an undergraduate seminar in Peking University during the epidemic period in 2020. The recorded log data show that all students concentrated themselves on the exam and did not leave the camera and did not speak. Originality/value During the epidemic period of the novel coronavirus outbreak, almost all educational institutions in the world use online learning as the best way to maintain the teaching and learning schedule for all students. However, current online instruction platforms lack the function to prevent the learners from cheating in online exams and cannot guarantee the integrity and equality for all examinees as in traditional classroom exams. The literature review shows that the online proctoring system should become an important component of online exams to tackle the growing online cheating problem. Although such proctoring systems have been developed and put on the market, the practical usage of such systems in authentic exams and its effect have not been reported. Those systems are heavyweight and commercial product and cannot be freely used in education. The light-weight IOPS developed by the authors could meet the need for online exam as a stable and practical approach and could contribute to the growing online learning and distance learning.
APA, Harvard, Vancouver, ISO, and other styles
47

"Shield Advanced Mitigation System of Distributed Denial of Service Attack in Integration of Internet of Things and Cloud Computing Environment." International Journal of Innovative Technology and Exploring Engineering 9, no. 2 (December 10, 2019): 1300–1306. http://dx.doi.org/10.35940/ijitee.a4841.129219.

Full text
Abstract:
Cloud services among public and business companies have become popular in recent years. For production activities, many companies rely on cloud technology. Distributed Denial of Services (DDoS) attack is an extremely damaging general and critical type of cloud attacks. Several efforts have been made in recent years to identify numerous types of DDoS attacks. This paper discusses the different types of DDoS attacks and their cloud computing consequences. Distributed Denial of Service attack (DDoS) is a malicious attempt to disrupt the normal movement of a targeted server, service or network through influx of internet traffic overwhelming the target or its infrastructure. The use of multiple affected computer systems as a source of attacks makes DDoS attacks effective. Computers and other networked tools, including IoT phones, may be included on exploited machines. A DDoS attack from a high level resembles a traffic jam that is caused by roads that prevents normal travel at their desired destination. So DDoS Attack is a major challenging problem in integrated Cloud and IoT. Hence, this paper proposes Shield Advanced Mitigation System of Distributed Denial of Service Attack in the integration of Internet of Things and Cloud Computing Environment. This secure architecture use two verification process to identify whether user is legitimate or malicious. Dynamic Captcha Testing with Equal Probability test for first verification process, moreover Zigsaw Image Puzzle Test is used for second verification process, and Intrusion Detection Prevention System is used to identify and prevent malicious user, moreover reverse proxy is used to hide server location. These functional components and flow could strengthen security in Client side network to provide cloud services furthermore to overcome distributed denial of service attack in the integration of Internet of Things and Cloud Environment.
APA, Harvard, Vancouver, ISO, and other styles
48

Parvathi, A., S. Imran Basha, M. Jayanth Kumar, B. Chandra Sekhara Bhagavan, and P. Dinesh Reddy. "Industrial Protection System using Arduino and IoT." Journal of Communication Engineering and its Innovations 7, no. 2 (July 8, 2021). http://dx.doi.org/10.46610/jocei.2021.v07i02.004.

Full text
Abstract:
The Industrial protection system designed using Arduino and IOT mainly focuses on the protection of industries from various losses occurring due to accidents caused due to improper conditions and maintenance. Gas leaks can cause fires that cause huge industrial losses; Instant fire detection is also required in the event of a furnace explosion or other conditions. Additionally, poor lighting in industries can create unsuitable working conditions, increasing the likelihood of accidents. The system uses Arduino to achieve this functionality. The system uses temperature sensors in combination with gas light sensors to detect fires, gas leaks, and low light to prevent industrial accidents and avoid leaks. These setups also work as an anti-theft security system where it utilizes the IR sensor to detect the objects coming in its path. So this IR sensor works with the help of direct incidence of radiation on the photodiode. This IR LED which is placed on one side of the board and the photodiode is placed on the other helps to detect any obstacle or object which comes closer to contact with it. This object detection is indicated with the help of an alarm to notify us. The system consists of light, gas, and temperature sensors interconnected with Arduino and LCD screens. Sensor data is constantly scanned to record values and check for fire, gas leaks, or poor lighting, and then this data is transmitted online. The Wi-fi module is used to achieve internet functionality. The Blynk server then displays this information online, to achieve the desired result.
APA, Harvard, Vancouver, ISO, and other styles
49

Puspitorini, Okkie, Nuradi Siswandari, Haniah Mahmudah, and Ari Wijayanti. "Measurement of Interconnecting Network for Roadside Unit Placement on Cellular Network to Support Intelligent Transportation System." Asian Journal of Applied Sciences 5, no. 2 (April 22, 2017). http://dx.doi.org/10.24203/ajas.v5i2.3243.

Full text
Abstract:
The significant problems in metropolitan’s traffic are road congestion and safety  The Intelligent Transportation Systems (ITS) offer improvement for the problems using Roadside Unit placement along the road to detect and inform all matters relating to traffic condition. This research will be conducted measurement interconnection network that will be used by Roadside Unit (RSU) to communicate with the central office. RSU will transmit data type of vehicle and speed information to the central office server. Measurements carried out on the existing cellular network and find the right position for placement of RSU according network availability by considering the received signal power, pathloss and performance data delivery. Measurement locations in the main road metropolitan city of Surabaya by using sensors (counted mode) as the RSU. From the measurements taken showed that communication between infrastructures managed by using digital sensors falcon plus II with a percentage error of less than 3%. Communications between the RSU and the central office using GPRS / GSM network supported by the presence of a nearby BTS tower. The power level of BTS antenna greater than  wireless modem (SIM 900) sensitivity (-107 dbm), with pathloss exponent about 2.77. The ability of data transmission by wireless modem (SIM 900) reached 85.6 Kbps to 42.8 Kbps for downlink and uplink. The server side using the internet network 512 Mbps with a dynamic public IP features that support port forwarding that is useful for data communication. Best sensor position for mounting the sensor horizontally at a height of 40-120 cm from ground level to the maximum detection distance of 150 m for vertical mounting above the overpass. Best sensor position facing the one lane road with a height of 5-6 m from ground level, with the best angle measurement is 45˚-60˚ for vertical and horizontal mounting. Average speed of vehicles is 38.34 km / h with a volume of 4128 units of vehicles, mostly motorcycles and traffic density 135 units / km. Keywords— Roadside unit, I2I, ITS, cellular network
APA, Harvard, Vancouver, ISO, and other styles
50

Whittemore, Katherine, Rachel Corrado, Marc Paladini, Alexander Davidson, Chaorui C. Huang, Demetre Daskalakis, Sally Slavinski, and David E. Lucero. "Data capture and visualization for a canine influenza outbreak — New York City, 2018." Online Journal of Public Health Informatics 11, no. 1 (May 30, 2019). http://dx.doi.org/10.5210/ojphi.v11i1.9670.

Full text
Abstract:
ObjectiveThe objectives of this project were to rapidly build and deploy a web-based reporting platform in response to a canine influenza H3N2 outbreak in New York City (NYC) and provide aggregate data back to the veterinary community as an interactive dashboard.IntroductionData-driven decision-making is a cornerstone of public health emergency response; therefore, a highly-configurable and rapidly deployable data capture system with built-in quality assurance (QA; e.g., completeness, standardization) is critical.1 Additionally, to keep key stakeholders informed of developments during an emergency, data need to be shared in a timely and effective manner. Dynamic data visualization is a particularly useful means of sharing data with healthcare providers and the public.2During Spring 2018, detection of canine influenza H3N2 among dogs in NYC caused concern in the veterinary community. Canine influenza is a highly contagious respiratory infection caused by an influenza A virus.3 However, no central database existed in NYC to monitor the outbreak and no single agency was responsible for data capture. Our team at the NYC Department of Health and Mental Hygiene (DOHMH) partnered with the NYC Veterinary Medical Association (VMA) to monitor the canine influenza H3N2 outbreak by building a web-based reporting platform and interactive dashboard.MethodsThe NYC DOHMH built and deployed a web-based reporting platform to aid veterinarians in reporting cases of canine influenza. We leveraged REDCap Cloud, a cloud-based graphical user interface data capture and management software. REDCap Cloud collected information regarding the provider, owner, dog, residence of dog, illness history, and influenza testing. We leveraged REDCap QA functionality in the form of mandatory questions to ensure data completeness. Several different field types — including dropdown menus, mutually exclusive radio buttons, and multi-select check boxes — were used to ensure data standardization. Skip logic was incorporated to guide users through unique sequences of questions based on the answers they entered. Reporting was voluntary.ResultsAfter requirements were gathered, the REDCap web-based reporting platform was rapidly deployed in approximately two business days. Over the course of one week, multiple versions of the dashboard were produced and the final iteration was completed. The entire system was built on server-side software that is available as free or open-source for individual licenses. The dashboard can be found at the following link: http://www.vmanyc.org/canine_influenza_dashboard.html.A total of 28 cases were reported by 6 providers during June–August 2018. All of the 28 cases were reported from 2 of the 5 NYC counties (boroughs); 17/28 (60.7%) were reported from Brooklyn and 11/28 (39.3%) were reported from Manhattan. We were able to collect mostly complete data by leveraging REDCap QA functionality. The reporting facility was listed in all cases, and an owner was listed in all but two cases. All reported cases used a PCR test for the detection of canine influenza H3N2. One reported case indicated polymerase chain reaction (PCR) test results as “not detected” which suggests that one negative case was reported through the system.ConclusionsUsing REDCap Cloud and R, we were able to rapidly build and deploy a web-based reporting platform and dynamic data visualization during an emergency response to an outbreak of canine influenza H3N2. Our system was used by veterinarians to report 28 cases of canine influenza. Future emergency responses for human disease outbreaks will likely benefit from the experience our team gained during our partnership with the NYC VMA.References1. Centers for Disease Control and Prevention. Public Health Emergency Response Guide for State, Local, and Tribal Public Health Directors. https://emergency.cdc.gov/planning/pdf/cdcresponseguide.pdf.2. Meyer M. The Rise of Healthcare Data Visualization. http://journal.ahima.org/2017/12/21/the-rise-of-healthcare-data-visualization/.3. American Veterinary Medical Association. Canine Influenza FAQ. https://www.avma.org/KB/Resources/FAQs/Pages/Control-of-Canine-Influenza-in-Dogs.aspx.4. Wickham H. R packages. http://r-pkgs.had.co.nz/.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography