856,719 research outputs found

    Face Prediction Model for an Automatic Age-invariant Face Recognition System

    Full text link
    Automated face recognition and identification softwares are becoming part of our daily life; it finds its abode not only with Facebook's auto photo tagging, Apple's iPhoto, Google's Picasa, Microsoft's Kinect, but also in Homeland Security Department's dedicated biometric face detection systems. Most of these automatic face identification systems fail where the effects of aging come into the picture. Little work exists in the literature on the subject of face prediction that accounts for aging, which is a vital part of the computer face recognition systems. In recent years, individual face components' (e.g. eyes, nose, mouth) features based matching algorithms have emerged, but these approaches are still not efficient. Therefore, in this work we describe a Face Prediction Model (FPM), which predicts human face aging or growth related image variation using Principle Component Analysis (PCA) and Artificial Neural Network (ANN) learning techniques. The FPM captures the facial changes, which occur with human aging and predicts the facial image with a few years of gap with an acceptable accuracy of face matching from 76 to 86%.Comment: 3 pages, 2 figure

    Categorization of Security Design Patterns

    Get PDF
    Strategies for software development often slight security-related considerations, due to the difficulty of developing realizable requirements, identifying and applying appropriate techniques, and teaching secure design. This work describes a three-part strategy for addressing these concerns. Part 1 provides detailed questions, derived from a two-level characterization of system security based on work by Chung et. al., to elicit precise requirements. Part 2 uses a novel framework for relating this characterization to previously published strategies, or patterns, for secure software development. Included case studies suggest the framework\u27s effectiveness, involving the application of three patterns for secure design (Limited View, Role-Based Access Control, Secure State Machine) to a production system for document management. Part 3 presents teaching modules to introduce patterns into lower-division computer science courses. Five modules, integer over ow, input validation, HTTPS, les access, and SQL injection, are proposed for conveying an aware of security patterns and their value in software development

    The Level of Information Security Awareness of First-Year University Students

    Get PDF
    According to the results of a representative survey by ESET Hungary Ltd. and statistics by Eurostat, in Hungary more than one million users visit infected webpages despite of the warnings of their antivirus program and almost every second individual caught a virus or other computer infection (worm, Trojan horse, etc.). These data are similar in Slovenia, in Croatia, in Slovakia and in Bulgaria. This can be caused by the low level of security awareness. According to the first International Computer and Information Literacy Study (ICILS), understanding of online safety and security issues are part of the definition of computer and information literacy. In 2012, the PISA assessment results show that among countries with deteriorating performance in digital reading, Hungary was one of the countries what shows the biggest declines in performance among their weakest students. This study discusses three topics: (1) What are pupils taught on e-safety, privacy and information security in Hungary and how much lesson hours can teachers use for these topics. This part of the study shows how solid is the “basement” of security awareness knowledge of an average pupil. (2) What level of information security awareness can be expected from an aver-age first-year university student from different fields of knowledge without any university level teaching? A questionnaire on important concepts and user behavior (password policy, social networks, etc.) can answer this question. (3) How and what can we teach these people in university in order to strengthen their awareness? This is an important question because most of these students will manage other people’s personal data at their workplaces, but how could they manage them securely if they cannot be vigilant with their own personal data

    Security in Automatic Data Processing Systems

    Get PDF
    Security in automatic data processing systems is concerned with the protection of equipment and data against unauthorized modifications or destruction, and accidental or intentional disclosure of information. This report consists of two parts: 1. An overview of current literature in the field. In this part, basic problems and solutions, terminology and concepts found in the theoretical aspects of data processing systems security are described. 2. A survey of the state of art in a sample area. During the survey, information about actual applications of security methods in the Orlando, Florida area was collected. This information was gathered by means of a questionnaire and it will permit a comparative analysis between the usage of security measures in large and small firms. It is hoped that this study will provide valuable information to both the computer practitioner and management and in addition, will create an awareness of the important role that the security function plays in an organization

    Computer Aided Verification

    Get PDF
    This open access two-volume set LNCS 11561 and 11562 constitutes the refereed proceedings of the 31st International Conference on Computer Aided Verification, CAV 2019, held in New York City, USA, in July 2019. The 52 full papers presented together with 13 tool papers and 2 case studies, were carefully reviewed and selected from 258 submissions. The papers were organized in the following topical sections: Part I: automata and timed systems; security and hyperproperties; synthesis; model checking; cyber-physical systems and machine learning; probabilistic systems, runtime techniques; dynamical, hybrid, and reactive systems; Part II: logics, decision procedures; and solvers; numerical programs; verification; distributed systems and networks; verification and invariants; and concurrency

    Computer Aided Verification

    Get PDF
    The open access two-volume set LNCS 11561 and 11562 constitutes the refereed proceedings of the 31st International Conference on Computer Aided Verification, CAV 2019, held in New York City, USA, in July 2019. The 52 full papers presented together with 13 tool papers and 2 case studies, were carefully reviewed and selected from 258 submissions. The papers were organized in the following topical sections: Part I: automata and timed systems; security and hyperproperties; synthesis; model checking; cyber-physical systems and machine learning; probabilistic systems, runtime techniques; dynamical, hybrid, and reactive systems; Part II: logics, decision procedures; and solvers; numerical programs; verification; distributed systems and networks; verification and invariants; and concurrency

    An Approach to Provide Security in Mobile Ad-Hoc Networks Using Counter Mode of Encryption on Mac Layer

    Full text link
    Security in any of the networks became an important issue in this paper we have implemented a security mechanism on Medium Access Control layer by Assured Neighbor based Security Protocol to provide authentication and confidentiality of packets along with High speed transmission for Ad hoc networks. Here we have divided the protocol into two different parts. The first part deals with Routing layer information; in this part we have tried to implement a possible strategy for detecting and isolating the malicious nodes. A trust counter for each node is determined which can be actively increased and decreased depending upon the trust value for the purpose of forwarding the packets from source node to destination node with the help of intermediate nodes. A threshold level is also predetermined to detect the malicious nodes. If the value of the node in trust counter is less than the threshold value then the node is denoted 'malicious'. The second part of our protocol deals with the security in the link layer. For this security reason we have used CTR (Counter) approach for authentication and encryption. We have simulated all our strategies and schemes in NS-2, the result of which gives a conclusion that our proposed protocol i.e. Assured Neighbor based Security Protocol can perform high packet delivery against various intruders and also packet delivery ratio against mobility with low delays and low overheads.Comment: 11 pages, 6 figures, accepted and cited in "First International Conference on Computer Science, Engineering and Applications (CCSEA-2011)
    • …
    corecore