Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2024
Constraint-based high utility mobile trajectory pattern mining for security systems
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 46, Issue 2Pages 3323–3338https://doi.org/10.3233/JIFS-233967In security system, high utility pattern mining of a large number of users mobile trajectories is helpful to analyze user behavior patterns, and enhance the internal prevention of the security system.Currently, the frequent pattern mining for mobile ...
- research-articleMarch 2024
Adaptive Human Interaction Detection Algorithm for Oilfield Security System
CSAI '23: Proceedings of the 2023 7th International Conference on Computer Science and Artificial IntelligencePages 259–263https://doi.org/10.1145/3638584.3638673This paper proposes an adaptive human interaction detection algorithm based on the Vision Transformer structure and domain adaptive algorithm for the security system in oil fields. The algorithm extracts features of individuals in the image using the ...
- research-articleNovember 2023
Enhanced authentication for de-duplication of big data on cloud storage system using machine learning approach
Cluster Computing (KLU-CLUS), Volume 27, Issue 3Pages 3683–3702https://doi.org/10.1007/s10586-023-04171-yAbstractEnormous information is an accumulation of vast measures of information that contains copied things gathered from different sources. Distinguishing copied information from enormous information is a difficult issue. In this paper secure ...
- research-articleMay 2022
RETRACTED ARTICLE: Verification and modeling of IoT time automata for gateway security system
Soft Computing - A Fusion of Foundations, Methodologies and Applications (SOFC), Volume 26, Issue 10Pages 4915–4928https://doi.org/10.1007/s00500-022-06897-0AbstractInternet of Things (IoT) is a multiple heterogeneous network, and its perception layer is often faced with various security threats. As the bridge between the perception layer and the network layer, the IoT gateway should have the security ...
- research-articleJanuary 2022
AntibIoTic: The Fog-enhanced distributed security system to protect the (legacy) Internet of Things
Journal of Computer Security (JOCS), Volume 30, Issue 5Pages 689–725https://doi.org/10.3233/JCS-210027The Internet of Things (IoT) is evolving our society; however, the growing adoption of IoT devices in many scenarios brings security and privacy implications. Current security solutions are either unsuitable for every IoT scenario or provide only partial ...
-
- research-articleOctober 2021
Trustworthy authorization method for security in Industrial Internet of Things
AbstractIndustrial Internet of Things (IIoT) realizes machine-to-machine communication and human–computer interaction (HCI) through communication network, which makes industrial production automatic and intelligent. Security is critical in ...
- ArticleJune 2021
Development of a Method for Identifying People by Processing Digital Images from Handprint
AbstractFingerprint recognition methods present problems due to the fact that some prints are blurred or have changes due to the activities carried out with the hands by some people. In addition, these identification methods can be violated by using false ...
- research-articleJune 2021
Study of transmission system for compressed and encrypted image
Multimedia Systems (MUME), Volume 27, Issue 3Pages 471–482https://doi.org/10.1007/s00530-020-00737-7AbstractAn evolutionary asymmetric cryptosystem is proposed using QWT + SPIHT and AES. This system is based on the Quincunx wavelet transform coupled with progressive encoder SPIHT (QWT + SPIHT) and encrypted by the algorithm “Advanced Encryption Standard”...
- research-articleFebruary 2020
Cryptographic system for data applications, in the context of internet of things
Microprocessors & Microsystems (MSYS), Volume 72, Issue Chttps://doi.org/10.1016/j.micpro.2019.102921AbstractWith each passing day, Internet of Things (IoT), has the potential to transform our society to a more digital way. In this paper, a cryptographic system is proposed, which has been designed and implemented, following the IoT optimized ...
- research-articleApril 2020
Design and Implementation of Smart Home Remote Monitoring System Based on Android Mobile Phone
ICIIP '19: Proceedings of the 4th International Conference on Intelligent Information ProcessingPages 195–199https://doi.org/10.1145/3378065.3378103According to the needs of many families, a smart home security system based on Android platform is designed. The overall design scheme of the system is given in this paper. The system is deeply analyzed from hardware and software by modules. The indoor ...
- research-articleSeptember 2019
Design of a Short Range Optical Pulse Transceiver System for Intruder Detection
EEET 2019: Proceedings of the 2019 2nd International Conference on Electronics and Electrical Engineering TechnologyPages 68–73https://doi.org/10.1145/3362752.3362755Recent advancement in wireless technology enables free transmission between devices and automatic operation within the home areas. In this paper, we develop, design and implement an optical pulse transmitter and receiver systems to create the real ...
- ArticleAugust 2019
Developing System from Low-Cost Devices to Build a Security and Fire System as a Part of IoT
AbstractNowadays electronic security systems are not only about the alarm going off with a loud beeping when an object has been disturbed. They cover multiple other useful features that ensure the owner’s safety and his properties. These features can be ...
- articleApril 2019
Real time security framework for detecting abnormal events at ATM installations
Journal of Real-Time Image Processing (SPJRTIP), Volume 16, Issue 2Pages 535–545https://doi.org/10.1007/s11554-016-0573-3Automated Teller Machines (ATM) transactions are quick and convenient, but the machines and the areas surrounding them make people and ATM vulnerable to felonious activities if not properly put under the protection. Responsibility for providing security ...
- research-articleFebruary 2019
Safe and Efficient Implementation of a Security System on ARM using Intra-level Privilege Separation
ACM Transactions on Privacy and Security (TOPS), Volume 22, Issue 2Article No.: 10, Pages 1–30https://doi.org/10.1145/3309698Security monitoring has long been considered as a fundamental mechanism to mitigate the damage of a security attack. Recently, intra-level security systems have been proposed that can efficiently and securely monitor system software without any ...
- articleOctober 2018
Queuing Strategy Optimization with Restricted Service Resources
Wireless Personal Communications: An International Journal (WPCO), Volume 102, Issue 4Pages 2681–2699https://doi.org/10.1007/s11277-018-5295-3Under the circumstance of congestion, the low-efficiency operation of security system is one of the major causes of frequent security incidents over the span of recent years. At the same time, identifying the potential bottleneck which disrupts the ...
- articleSeptember 2018
A study on various methods used for video summarization and moving object detection for video surveillance applications
Multimedia Tools and Applications (MTAA), Volume 77, Issue 18Pages 23273–23290https://doi.org/10.1007/s11042-018-5671-8With the advancement in digital video technology, video surveillance has been playing its vital role for ensuring safety and security. The surveillance systems are deployed in wide range of applications to invigilate stuffs and to analyse the activities ...
- research-articleJanuary 2016
Fuzzy reliability analysis of integrated network traffic visualization system
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 31, Issue 3Pages 1941–1953https://doi.org/10.3233/JIFS-16128Integrated Network Traffic Visualization System (INTVS) is a security system used for decision making against the malicious traffic. This paper presents usage of fuzzy fault tree analysis (FFTA) technique to get the reliability of INTVS. Fault-tree ...
- articleJune 2013
Securing web-clients with instrumented code and dynamic runtime monitoring
Journal of Systems and Software (JSSO), Volume 86, Issue 6Pages 1689–1711https://doi.org/10.1016/j.jss.2013.02.047Security and privacy concerns remain a major factor that hinders the whole scale adoption of web-based technology in sensitive situations, such as financial transactions (Gao and Owolabi, 2008; Lichtenstein and Williamson, 2006). These concerns impact ...
- ArticleNovember 2011
Research on Electronic Commerce Model Based on Mobile Agent Framework: A Case Study
ICIII '11: Proceedings of the 2011 International Conference on Information Management, Innovation Management and Industrial Engineering - Volume 01Pages 480–482https://doi.org/10.1109/ICIII.2011.122Combination of mobile Agent, Aglet platform and the Java language, this paper presents a security framework of e-commerce based on mobile agents and its implementation. In electronic shopping process, for example, the security issues of a mobile agent ...
- articleJune 2011
Deep packet pre-filtering and finite state encoding for adaptive intrusion detection system
Computer Networks: The International Journal of Computer and Telecommunications Networking (CNTW), Volume 55, Issue 8Pages 1648–1661https://doi.org/10.1016/j.comnet.2010.12.007An intrusion detection system (IDS) is a promising technique for detecting and thwarting attacks on computer systems and networks. In the context of ever-changing threats, new attacks are constantly created, and new rules for identifying them are ...