466 research outputs found

    Deteção de intrusões de rede baseada em anomalias

    Get PDF
    Dissertação de mestrado integrado em Eletrónica Industrial e ComputadoresAo longo dos últimos anos, a segurança de hardware e software tornou-se uma grande preocupação. À medida que a complexidade dos sistemas aumenta, as suas vulnerabilidades a sofisticadas técnicas de ataque têm proporcionalmente escalado. Frequentemente o problema reside na heterogenidade de dispositivos conectados ao veículo, tornando difícil a convergência da monitorização de todos os protocolos num único produto de segurança. Por esse motivo, o mercado requer ferramentas mais avançadas para a monitorizar ambientes críticos à vida humana, tais como os nossos automóveis. Considerando que existem várias formas de interagir com os sistemas de entretenimento do automóvel como o Bluetooth, o Wi-fi ou CDs multimédia, a necessidade de auditar as suas interfaces tornou-se uma prioridade, uma vez que elas representam um sério meio de aceeso à rede interna do carro. Atualmente, os mecanismos de segurança de um carro focam-se na monitotização da rede CAN, deixando para trás as tecnologias referidas e não contemplando os sistemas não críticos. Como exemplo disso, o Bluetooth traz desafios diferentes da rede CAN, uma vez que interage diretamente com o utilizador e está exposto a ataques externos. Uma abordagem alternativa para tornar o automóvel num sistema mais robusto é manter sob supervisão as comunicações que com este são estabelecidas. Ao implementar uma detecção de intrusão baseada em anomalias, esta dissertação visa analisar o protocolo Bluetooth no sentido de identificar interações anormais que possam alertar para uma situação fora dos padrões de utilização. Em última análise, este produto de software embebido incorpora uma grande margem de auto-aprendizagem, que é vital para enfrentar quaisquer ameaças desconhecidas e aumentar os níveis de segurança globais. Ao longo deste documento, apresentamos o estudo do problema seguido de uma metodologia alternativa que implementa um algoritmo baseado numa LSTM para prever a sequência de comandos HCI correspondentes a tráfego Bluetooth normal. Os resultados mostram a forma como esta abordagem pode impactar a deteção de intrusões nestes ambientes ao demonstrar uma grande capacidade para identificar padrões anómalos no conjunto de dados considerado.In the last few years, hardware and software security have become a major concern. As the systems’ complexity increases, its vulnerabilities to several sophisticated attack techniques have escalated likewise. Quite often, the problem lies in the heterogeneity of the devices connected to the vehicle, making it difficult to converge the monitoring systems of all existing protocols into one security product. Thereby, the market requires more refined tools to monitor life-risky environments such as personal vehicles. Considering that there are several ways to interact with the car’s infotainment system, such as Wi-fi, Bluetooth, or CD player, the need to audit these interfaces has become a priority as they represent a serious channel to reach the internal car network. Nowadays, security in car networks focuses on CAN bus monitoring, leaving behind the aforementioned technologies and not contemplating other non-critical systems. As an example of these concerns, Bluetooth brings different challenges compared to CAN as it interacts directly with the user, being exposed to external attacks. An alternative approach to converting modern vehicles and their set of computers into more robust systems is to keep track of established communications with them. By enforcing anomaly-based intrusion detection this dissertation aims to analyze the Bluetooth protocol to identify abnormal user interactions that may alert for a non conforming pattern. Ultimately, such embedded software product incorporates a self-learning edge, which is vital to face newly developed threats and increasing global security levels. Throughout this document, we present the study case followed by an alternative methodology that implements an LSTM based algorithm to predict a sequence of HCI commands corresponding to normal Bluetooth traffic. The results show how this approach can impact intrusion detection in such environments by expressing a high capability of identifying abnormal patterns in the considered data

    Video Conferencing: Infrastructures, Practices, Aesthetics

    Get PDF
    The COVID-19 pandemic has reorganized existing methods of exchange, turning comparatively marginal technologies into the new normal. Multipoint videoconferencing in particular has become a favored means for web-based forms of remote communication and collaboration without physical copresence. Taking the recent mainstreaming of videoconferencing as its point of departure, this anthology examines the complex mediality of this new form of social interaction. Connecting theoretical reflection with material case studies, the contributors question practices, politics and aesthetics of videoconferencing and the specific meanings it acquires in different historical, cultural and social contexts

    ATHENA Research Book, Volume 2

    Get PDF
    ATHENA European University is an association of nine higher education institutions with the mission of promoting excellence in research and innovation by enabling international cooperation. The acronym ATHENA stands for Association of Advanced Technologies in Higher Education. Partner institutions are from France, Germany, Greece, Italy, Lithuania, Portugal and Slovenia: University of Orléans, University of Siegen, Hellenic Mediterranean University, Niccolò Cusano University, Vilnius Gediminas Technical University, Polytechnic Institute of Porto and University of Maribor. In 2022, two institutions joined the alliance: the Maria Curie-Skłodowska University from Poland and the University of Vigo from Spain. Also in 2022, an institution from Austria joined the alliance as an associate member: Carinthia University of Applied Sciences. This research book presents a selection of the research activities of ATHENA University's partners. It contains an overview of the research activities of individual members, a selection of the most important bibliographic works of members, peer-reviewed student theses, a descriptive list of ATHENA lectures and reports from individual working sections of the ATHENA project. The ATHENA Research Book provides a platform that encourages collaborative and interdisciplinary research projects by advanced and early career researchers

    5th International Open and Distance Learning Conference Proceedings Book = 5. Uluslararası Açık ve Uzaktan Öğrenme Konferansı Bildiri Kitabı

    Get PDF
    In celebration of our 40th anniversary in open and distance learning, we are happy and proud to organize the 5th International Open & Distance Learning Conference- IODL 2022, which was held at Anadolu University, Eskişehir, Türkiye on 28-30 September 2022. After the conferences in 2002, 2006, 2010, and 2019, IODL 2022 is the 5th IODL event hosted by Anadolu University Open Education System (OES)

    6G to Take the Digital Divide by Storm: Key Technologies and Trends to Bridge the Gap

    Get PDF
    The pandemic caused by COVID-19 has shed light on the urgency of bridging the digital divide to guarantee equity in the fruition of different services by all citizens. The inability to access the digital world may be due to a lack of network infrastructure, which we refer to as service-delivery divide, or to the physical conditions, handicaps, age, or digital illiteracy of the citizens, that is mentioned as service-fruition divide. In this paper, we discuss the way how future sixth-generation (6G) systems can remedy actual limitations in the realization of a truly digital world. Hence, we introduce the key technologies for bridging the digital gap and show how they can work in two use cases of particular importance, namely eHealth and education, where digital inequalities have been dramatically augmented by the pandemic. Finally, considerations about the socio-economical impacts of future 6G solutions are drawn

    Individual control and data protection. Looking back and moving forward.

    Get PDF
    This work aims at investigating the concept of “individual control over personal data”, as a core constituent of data protection law. In an era in which personal data have become a main driving force behind innovation, growth and prosperity; companies and governments are at war to gain new usable knowledge; technological advances are upstaging expectations in terms of what can be inferred, predicted and manipulated through data, and people are milked at an increasing speed to fulfill the generalized data hunger, calls to bring individuals back in control of their personal data and develop a more individual-friendly data ecosystem have been increasingly pressing. Yet, older and newer hurdles still hinder a satisfactory implementation of this vision. Against this backdrop, this work intends to investigate in depth the notion of “individual control” in the data protection realm and its persisting shortcomings, and attempt to further explore what steps could be made to move forward, in order to offer the necessary support or supplementation to this underlying principle of data protection. To this end, the analysis starts by providing a historical overview to track the emergence of this notion in the European data protection context, taking into account the role assigned to the concept of “control” in the doctrinal debate, its legal manifestation within regulatory provisions (at national, international and EU level) and the approach of the CJEU jurisprudence on the matter. The analysis further considers the manifold issues that undermine the effective implementation of the idea of individual control, particularly as a result of the technological changes that have transformed our society and revolutionized the way in which we live and communicate. Finally, in light of the shortcomings affecting the privacy self-management logic, the work seeks to explore possible a selection of mechanisms and approaches that, if adequately leveraged and implemented, could offer effective support and complementation to the individual control model, with a view to increasing the level of protection offered to individuals. These mechanisms include both “individual-centric” measures, whose leading actors remain data subjects and whose objective is to enhance the means individuals can use to gain better control, but also measures that move beyond a strict “data subject-focused” dimension, in that they are addressed to different societal actors and approach data protection from a broader collective rather than strictly individualistic perspective. As the analysis shows, there is, unfortunately, no silver bullet. However, the promotion and valorization of the proposed mechanisms and the combined benefits that these could bring, in their own way, on the data protection table are a first essential step to start building a systemic and comprehensive response to the protection gaps that afflict individuals and society as a result of the weaknesses currently affecting the individual control logic

    El patrimonio cultural en los programas marco de investigación de la Unión Europea: análisis y tendencias

    Get PDF
    Esta investigación analiza los proyectos europeos de investigación financiados a través de los programas marco de la Unión Europea, que tienen por temática principal el patrimonio cultural. Pretende por lo tanto entender qué tipo de proyectos se han financiado dentro de la disciplina y cuál ha sido su evolución temática a lo largo del tiempo y para ello, emplea técnicas de análisis de datos y procesamiento de lenguaje natural (NLP) para extraer información de las principales fuentes de información, y procesarla con el fin de aportar luz a la pregunta de investigación: ¿qué temáticas, dentro del ámbito del patrimonio cultural, abordan los proyectos europeos de investigación? Partiendo de el contexto político y legal en el que se financian estos proyectos, el trabajo desarrolla una metodología para identificar, procesar y analizar los datos asociados a los proyectos europeos de investigación sobre patrimonio cultural, metodología que sirve posteriormente para analizar y describir las características y tendencias del conjunto de proyectos. Finaliza la investigación, identificando y describiendo brevemente las políticas actuales que puedan tener una influencia sobre la definición de las temáticas de los proyectos del ámbito del patrimonio cultural en el futuro próximo.This research analyses European research projects funded through the European Union's Framework Programmes, whose main thematic area is cultural heritage. It therefore aims to understand what kind of projects have been funded within the discipline and what their thematic evolution has been over time, using data analysis and natural language processing (NLP) techniques to extract information from the main sources of information and process it in order to shed light on the research question: what themes, within the field of cultural heritage, do European research projects address? Starting from the political and legal context in which these projects are funded, we will develop a methodology to identify, process and analyse the data associated with European cultural heritage research projects, a methodology that will help us to analyse and describe the characteristics and trends of the projects as a whole. We will conclude the research by briefly referencing current policies that may influence the definition of project's topics in the field of cultural heritage in the near future.Universidad de Sevilla. Máster de Arquitectura y Patrimonio Históric

    Re-presenting China in Digital Immersive Art: Virtual Reality, Imaginaries, and Cultural Presence

    Get PDF
    The thesis explores how digital technology, in particular virtual reality and augmented reality, is playing a role in China’s rejuvenation, especially in relation to cultural displays, performances, and art exhibitions. This project examines how audiences, both in China and globally, respond to ‘Digital China’, a concept describing how people’s everyday lives in China are becoming superconnected by digital technology. Qualitative methodology with a multi-perspectival approach is applied to advance the aim of the project

    INTER-ENG 2020

    Get PDF
    These proceedings contain research papers that were accepted for presentation at the 14th International Conference Inter-Eng 2020 ,Interdisciplinarity in Engineering, which was held on 8–9 October 2020, in Târgu Mureș, Romania. It is a leading international professional and scientific forum for engineers and scientists to present research works, contributions, and recent developments, as well as current practices in engineering, which is falling into a tradition of important scientific events occurring at Faculty of Engineering and Information Technology in the George Emil Palade University of Medicine, Pharmacy Science, and Technology of Târgu Mures, Romania. The Inter-Eng conference started from the observation that in the 21st century, the era of high technology, without new approaches in research, we cannot speak of a harmonious society. The theme of the conference, proposing a new approach related to Industry 4.0, was the development of a new generation of smart factories based on the manufacturing and assembly process digitalization, related to advanced manufacturing technology, lean manufacturing, sustainable manufacturing, additive manufacturing, and manufacturing tools and equipment. The conference slogan was “Europe’s future is digital: a broad vision of the Industry 4.0 concept beyond direct manufacturing in the company”
    corecore