Searched for: +
(1 - 20 of 33)

Pages

document
Li, Meng (author), Shen, Yanzhe (author), Ye, Guixin (author), He, Jialing (author), Zheng, Xin (author), Zhang, Zijian (author), Zhu, Liehuang (author), Conti, M. (author)
Digital forensics is crucial to fight crimes around the world. Decentralized Digital Forensics (DDF) promotes it to another level by channeling the power of blockchain into digital investigations. In this work, we focus on the privacy and security of DDF. Our motivations arise from (1) how to track an anonymous- and-malicious data user who...
journal article 2024
document
Li, Meng (author), Chen, Yifei (author), Lal, C. (author), Conti, M. (author), Alazab, Mamoun (author), Hu, Donghui (author)
Vehicular Digital Forensics (VDF) is essential to enable liability cognizance of accidents and fight against crimes. Ensuring the authority to timely gather, analyze, and trace data promotes vehicular investigations. However, adversaries crave the identity of the data provider/user, damage the evidence, violate evidence jurisdiction, and leak...
journal article 2023
document
Lotto, Alessandro (author), Singh, Vaibhav (author), Ramasubramanian, Bhaskar (author), Brighente, Alessandro (author), Conti, M. (author), Poovendran, Radha (author)
Fifth-generation (5G) cellular communication networks are being deployed on applications beyond mobile devices, including vehicular networks and industry automation. Despite their increasing popularity, 5G networks, as defined by the Third Generation Partnership Project (3GPP), have been shown to be vulnerable against fake base station (FBS)...
conference paper 2023
document
Li, Meng (author), Chen, Yifei (author), Zhu, Liehaung (author), Zhang, Zijian (author), Ni, Jianbing (author), Lal, C. (author), Conti, M. (author)
Many regions are in urgent need of facial masks for slowing down the spread of COVID-19. To fight the pandemic, people are contributing masks through donation systems. Most existing systems are built on a centralized architecture which is prone to the single point of failure and lack of transparency. Blockchain-based solutions neglect...
journal article 2023
document
Li, Meng (author), Zhu, Liehuang (author), Zhang, Zijian (author), Lal, C. (author), Conti, M. (author), Alazab, Mamoun (author)
Traffic monitoring services collect traffic reports and respond to users' traffic queries. However, the reports and queries may reveal the user's identity and location. Although different anonymization techniques have been applied to protect user privacy, a new security threat arises, namely, n-by-1 jamming attack, in which an anonymous...
journal article 2022
document
Siddiqi, M.A. (author), Hahn, Georg (author), Hamdioui, S. (author), Serdijn, W.A. (author), Strydis, C. (author)
A Medical Body Area Network (MBAN) is an ensemble of collaborating, potentially heterogeneous, medical devices located inside, on the surface of or around the human body with the objective of tackling one or multiple medical conditions of the MBAN host. These devices-which are a special category of Wireless Body Area Networks (WBANs)–collect,...
journal article 2022
document
Hutiri, Wiebke (author), Ding, Aaron Yi (author)
In an age of surveillance capitalism, anchoring the design of emerging smart services in trustworthiness is urgent and important. Edge Intelligence, which brings together the fields of AI and Edge computing, is a key enabling technology for smart services. Trustworthy Edge Intelligence should thus be a priority research concern. However,...
conference paper 2022
document
Aiolli, Fabio (author), Conti, M. (author), Picek, S. (author), Polato, M. (author)
Nowadays, online services, like e-commerce or streaming services, provide a personalized user experience through recommender systems. Recommender systems are built upon a vast amount of data about users/items acquired by the services. Such knowledge represents an invaluable resource. However, commonly, part of this knowledge is public and can...
journal article 2022
document
Chen, C. (author)
Process and chemical industrial areas consist of hundreds and even thousands of installations situated next to each other, where quantities of hazardous (e.g., flammable, explosive, toxic) substances are stored, transported, or processed. These installations are mutually linked in terms of the hazard level they pose to each other in the system....
doctoral thesis 2021
document
Hauser, S.J. (author)
The explosion in the port of Beirut in 2020 showed that ports are clusters of risks, and that accidents in port areas can have disastrous effects on close-by residential areas or historic city centers. Such disasters are not new, and cities and nations have had time to establish special safety regulations and prevent such disasters. Because...
report 2021
document
Rikken, O.K. (author), Janssen, M.F.W.H.A. (author), Roosenboom-Kwee, Z. (author), Büttgen, Marion (author), Dicenta, Julia (author), Spohrer, Kai (author), Venkatesh, Viswanath (author), Raman, Rajalakshmi (author), Hoehle, Hartmut (author), De Keyser, Arne (author)
As blockchain technology is maturing to be confidently used in practice, its applications are becoming evident and, correspondingly, more blockchain research is being published, also extending to more domains than before. To date, scientific research in the field has predominantly focused on subject areas such as finance, computer science, and...
journal article 2021
document
Tjiam, Kevin (author), Wang, R. (author), Chen, H. (author), Liang, K. (author)
Smart contracts on Ethereum enable billions of dollars to be transacted in a decentralized, transparent and trustless environment. However, adversaries lie await in the Dark Forest, waiting to exploit any and all smart contract vulnerabilities in order to extract profits from unsuspecting victims in this new financial system. As the...
conference paper 2021
document
Peyghami, S. (author), Palensky, P. (author), Blaabjerg, Frede (author)
Renewable energy resources are becoming the dominating element in power systems. Along with de-carbonization, they transform power systems into a more distributed, autonomous, bottom-up style one. We speak of Smart Grid and Microgrid when distributed energy resources take over. While being a means to improve technical and financial efficiency,...
journal article 2020
document
Wijaya, Herman (author), Aniche, Maurício (author), Mathur, Aditya (author)
A novel approach is proposed for constructing models of anomaly detectors using supervised learning from the traces of normal and abnormal operations of an Industrial Control System (ICS). Such detectors are of value in detecting process anomalies in complex critical infrastructure such as power generation and water treatment systems. The traces...
conference paper 2020
document
Hafeez, Ibbad (author), Antikainen, Markku (author), Ding, Aaron Yi (author), Tarkoma, Sasu (author)
IoT devices are notoriously vulnerable even to trivial attacks and can be easily compromised. In addition, resource constraints and heterogeneity of IoT devices make it impractical to secure IoT installations using traditional endpoint and network security solutions. To address this problem, we present IoT-Keeper, a lightweight system which...
journal article 2020
document
Tervoort, Tom (author), Tuler de Oliveira, M. (author), Pieters, W. (author), van Gelder, P.H.A.J.M. (author), Olabarriaga, Silvia Delgado (author), Marquering, Henk (author)
Cyberattacks against healthcare institutions threaten patient care. The risk of being targeted by a damaging attack is increased when medical devices are used which rely on unmaintained legacy software that cannot be replaced and may have publicly known vulnerabilities. This review aims to provide insight into solutions presented in the...
journal article 2020
document
Gandini, E. (author), Svedin, Jan (author), Bryllert, Thomas (author), Llombart, Nuria (author)
In this paper, the practical tradeoffs for designing submillimeter wavelength imagers based on optomechanical systems combined with focal plane arrays (FPAs) are presented. The architecture of these systems differs for operation at short and long ranges. General formulas to derive the effective field of view of diffraction limited quasi...
journal article 2017
document
Yang, L. (author), Li, Pengdeng (author), Yang, Xiaofan (author), Tang, Yuan Yan (author)
Advanced persistent threats (APTs) pose a grave threat to cyberspace, because they deactivate all the conventional cyber defense mechanisms. This paper addresses the issue of evaluating the security of the cyber networks under APTs. For this purpose, a dynamic model capturing the APT-based cyber-attack-defense processes is proposed....
journal article 2017
document
Kermisch, C.F.N. (author), Taebi, B. (author)
In this paper we suggest considering sustainability as a moral framework based on social justice, which can be used to evaluate technological choices. In order to make sustainability applicable to discussions of nuclear energy production and waste management, we focus on three key ethical questions, namely: (i) what should be sustained; (ii) why...
journal article 2017
document
Reniers, G.L.L.M.E. (author)
This paper argues that a new paradigm is needed in the manufacturing industry to further substantially advance safety as part of the industry 4.0 concept. The different domains that need to be focused upon are Cluster-thinking and cooperation, High transparency and efficient inspections, Education and training, Security integration, and...
journal article 2017
Searched for: +
(1 - 20 of 33)

Pages