5,372 research outputs found
A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models.
The Internet of Things (IoT) is extensively used in modern-day life, such as in smart homes, intelligent transportation, etc. However, the present security measures cannot fully protect the IoT due to its vulnerability to malicious assaults. Intrusion detection can protect IoT devices from the most harmful attacks as a security tool. Nevertheless, the time and detection efficiencies of conventional intrusion detection methods need to be more accurate. The main contribution of this paper is to develop a simple as well as intelligent security framework for protecting IoT from cyber-attacks. For this purpose, a combination of Decisive Red Fox (DRF) Optimization and Descriptive Back Propagated Radial Basis Function (DBRF) classification are developed in the proposed work. The novelty of this work is, a recently developed DRF optimization methodology incorporated with the machine learning algorithm is utilized for maximizing the security level of IoT systems. First, the data preprocessing and normalization operations are performed to generate the balanced IoT dataset for improving the detection accuracy of classification. Then, the DRF optimization algorithm is applied to optimally tune the features required for accurate intrusion detection and classification. It also supports increasing the training speed and reducing the error rate of the classifier. Moreover, the DBRF classification model is deployed to categorize the normal and attacking data flows using optimized features. Here, the proposed DRF-DBRF security model's performance is validated and tested using five different and popular IoT benchmarking datasets. Finally, the results are compared with the previous anomaly detection approaches by using various evaluation parameters
Mapping Critical Practice In A Transdisciplinary Urban Studio
Architecture and Planning exist to make positive changes to our environment. Future practitioners in these
disciplines will be responsible for how our cities develop and are managed - they will be required to exercise their professional judgement in complex and unpredictable contexts. There is increasing interest in transdisciplinary urbanism, but implementation in academic contexts has to date been relatively limited. This thesis aims to build on these examples, through a detailed account of one academic design studio which operates across architecture and urban planning; in doing so it aims to make the case for transdisciplinary, problem and place-based studio teaching.
The study considers how a transdisciplinary studio environment supported students to develop a critical
approach to practice through collaborative discourse. It looked at studio methods/practices; what it means to practice ‘critically’ in the context of design; and the role ‘going public’ by sharing ideas in public fora might play in developing critical positions.
The study was undertaken in collaboration with nine students, a single cohort undertaking the final year of a hybrid master’s qualification in Architecture with Urban Planning. It adopts socio-material and spatial approaches to follow how the studio environment and the students’ emerging interdisciplinary identities shaped both their individual and their shared work. It mapped how their approach to their practice evolved through observations, interviews, and informal conversations, and through their drawings, models and journals. In carrying out these observations, and their analysis, I have returned to drawing methods common in architecture. This allowed me to explore and record aspects of studio practice which might otherwise be missed and revealed the importance of visual and spatial thinking to my own practice. Observations revealed how material spaces, tools and artefacts acted to structure social relations in the studio, and how these relations shaped individual approaches to critical practice
A Survey on Forensics and Compliance Auditing for Critical Infrastructure Protection
The broadening dependency and reliance that modern societies have on essential services
provided by Critical Infrastructures is increasing the relevance of their trustworthiness. However, Critical
Infrastructures are attractive targets for cyberattacks, due to the potential for considerable impact, not just
at the economic level but also in terms of physical damage and even loss of human life. Complementing
traditional security mechanisms, forensics and compliance audit processes play an important role in ensuring
Critical Infrastructure trustworthiness. Compliance auditing contributes to checking if security measures are
in place and compliant with standards and internal policies. Forensics assist the investigation of past security
incidents. Since these two areas significantly overlap, in terms of data sources, tools and techniques, they can
be merged into unified Forensics and Compliance Auditing (FCA) frameworks. In this paper, we survey the
latest developments, methodologies, challenges, and solutions addressing forensics and compliance auditing
in the scope of Critical Infrastructure Protection. This survey focuses on relevant contributions, capable of
tackling the requirements imposed by massively distributed and complex Industrial Automation and Control
Systems, in terms of handling large volumes of heterogeneous data (that can be noisy, ambiguous, and
redundant) for analytic purposes, with adequate performance and reliability. The achieved results produced
a taxonomy in the field of FCA whose key categories denote the relevant topics in the literature. Also, the
collected knowledge resulted in the establishment of a reference FCA architecture, proposed as a generic
template for a converged platform. These results are intended to guide future research on forensics and
compliance auditing for Critical Infrastructure Protection.info:eu-repo/semantics/publishedVersio
A Trust Management Framework for Vehicular Ad Hoc Networks
The inception of Vehicular Ad Hoc Networks (VANETs) provides an opportunity for road users and public infrastructure to share information that improves the operation of roads and the driver experience. However, such systems can be vulnerable to malicious external entities and legitimate users. Trust management is used to address attacks from legitimate users in accordance with a user’s trust score. Trust models evaluate messages to assign rewards or punishments. This can be used to influence a driver’s future behaviour or, in extremis, block the driver. With receiver-side schemes, various methods are used to evaluate trust including, reputation computation, neighbour recommendations, and storing historical information. However, they incur overhead and add a delay when deciding whether to accept or reject messages. In this thesis, we propose a novel Tamper-Proof Device (TPD) based trust framework for managing trust of multiple drivers at the sender side vehicle that updates trust, stores, and protects information from malicious tampering. The TPD also regulates, rewards, and punishes each specific driver, as required. Furthermore, the trust score determines the classes of message that a driver can access. Dissemination of feedback is only required when there is an attack (conflicting information). A Road-Side Unit (RSU) rules on a dispute, using either the sum of products of trust and feedback or official vehicle data if available. These “untrue attacks” are resolved by an RSU using collaboration, and then providing a fixed amount of reward and punishment, as appropriate. Repeated attacks are addressed by incremental punishments and potentially driver access-blocking when conditions are met. The lack of sophistication in this fixed RSU assessment scheme is then addressed by a novel fuzzy logic-based RSU approach. This determines a fairer level of reward and punishment based on the severity of incident, driver past behaviour, and RSU confidence. The fuzzy RSU controller assesses judgements in such a way as to encourage drivers to improve their behaviour. Although any driver can lie in any situation, we believe that trustworthy drivers are more likely to remain so, and vice versa. We capture this behaviour in a Markov chain model for the sender and reporter driver behaviours where a driver’s truthfulness is influenced by their trust score and trust state. For each trust state, the driver’s likelihood of lying or honesty is set by a probability distribution which is different for each state. This framework is analysed in Veins using various classes of vehicles under different traffic conditions. Results confirm that the framework operates effectively in the presence of untrue and inconsistent attacks. The correct functioning is confirmed with the system appropriately classifying incidents when clarifier vehicles send truthful feedback. The framework is also evaluated against a centralized reputation scheme and the results demonstrate that it outperforms the reputation approach in terms of reduced communication overhead and shorter response time. Next, we perform a set of experiments to evaluate the performance of the fuzzy assessment in Veins. The fuzzy and fixed RSU assessment schemes are compared, and the results show that the fuzzy scheme provides better overall driver behaviour. The Markov chain driver behaviour model is also examined when changing the initial trust score of all drivers
Proceedings of the 10th International congress on architectural technology (ICAT 2024): architectural technology transformation.
The profession of architectural technology is influential in the transformation of the built environment regionally, nationally, and internationally. The congress provides a platform for industry, educators, researchers, and the next generation of built environment students and professionals to showcase where their influence is transforming the built environment through novel ideas, businesses, leadership, innovation, digital transformation, research and development, and sustainable forward-thinking technological and construction assembly design
Modern computing: Vision and challenges
Over the past six decades, the computing systems field has experienced significant transformations, profoundly impacting society with transformational developments, such as the Internet and the commodification of computing. Underpinned by technological advancements, computer systems, far from being static, have been continuously evolving and adapting to cover multifaceted societal niches. This has led to new paradigms such as cloud, fog, edge computing, and the Internet of Things (IoT), which offer fresh economic and creative opportunities. Nevertheless, this rapid change poses complex research challenges, especially in maximizing potential and enhancing functionality. As such, to maintain an economical level of performance that meets ever-tighter requirements, one must understand the drivers of new model emergence and expansion, and how contemporary challenges differ from past ones. To that end, this article investigates and assesses the factors influencing the evolution of computing systems, covering established systems and architectures as well as newer developments, such as serverless computing, quantum computing, and on-device AI on edge devices. Trends emerge when one traces technological trajectory, which includes the rapid obsolescence of frameworks due to business and technical constraints, a move towards specialized systems and models, and varying approaches to centralized and decentralized control. This comprehensive review of modern computing systems looks ahead to the future of research in the field, highlighting key challenges and emerging trends, and underscoring their importance in cost-effectively driving technological progress
1st Design Factory Global Network Research Conference ‘Designing the Future’ 5-6 October 2022
DFGN.R 2022 -Designing the Future - is the first research conference organised by the Design Factory Global Network. The open event offers the opportunity for all like-minded educators, designers and researchers to share their insights and inspire others on education, methods, practices and ecosystems of co-creation and innovation. The DFGN.R conference is a two-day event hosted on-site in Leeuwarden, the Netherlands. The conference is organized alongside International Design Factory Week 2022, the annual gathering of DFGN members. This year's conference is organized in collaboration with Aalto University from Helsinki Finland and hosted by the NHL Stenden University of Applied Sciences
Recommended from our members
Digitally supported assessment
This chapter focuses on digital assessment and feedback practices in distance education. Providing evidence of learning through assessment is at the heart of students’ experience of higher education (HE), whatever their mode of study. Open and distance education-focused institutions have justifiably been proud of their technical innovation, tending to move rapidly to harness available technologies (from post to broadcast media and, most recently, online media) in their mission to enable education for remote, distributed groups of learners. In recent years, distance education courses have, in the main, moved from paper and digital media delivered physically to wholly online delivery, except where the circumstances of target learners preclude reliance on a reliable and fast internet connection. In terms of content, discussion and collaboration, where distance education has forged ahead, campus-based, blended programmes have generally followed. However, in terms of assessment and feedback, distance education has remained somewhat conservative. While most assessment in distance education has taken place online along with content and communication, there has been a tendency to replicate fairly traditional assessment formats using digital tools
- …