98 research outputs found
Towards Adaptive Web - Analysing and Recommending Web Users’ Behaviour. Veebikasutajate k\ue4itumise anal\ufc\ufcs ja soovitused adaptiivse veebi loomiseks
Towards Adaptive Web - Analysing and Recommending Web Users’ Behaviour. Veebikasutajate k\ue4itumise anal\ufc\ufcs ja soovitused adaptiivse veebi loomiseks
Overcoming System Complexity using Models and Knowledge Structures. Editorial Introduction to Issue 36 of CSIMQ
Models allow us to simplify reality and give advantages to both decomposition and abstraction. Models can have various forms from textual, tabular, mathematical, and graphical to a combination of these formats. Formal models can be processed, or even executed, by machines. An engineering model must satisfy such characteristics as abstraction, understandability, accuracy, predictiveness, and inexpensiveness. Models explicitly represent knowledge of the modeled domain in a form suitable for reasoning about them and learning. Knowledge may be descriptive, structural, procedural, meta-, or heuristic. Focus on one type of knowledge during the analysis may ignore the other one. Moreover, analysis and reasoning also rely on data representation forms which may lose accuracy due to simplification and different assumptions. Therefore, completeness, correctness, and adequacy of knowledge as well as particularities of the representing structure may affect the results of knowledge processing and decision making. Therefore, the capability of models (and other structures) to represent knowledge completely, adequately, and accurately is still a matter of various research activities. This issue of CSIMQ is devoted to this matter
Case Study: Assessing the Security of a ZigBee Smart HomeNetwork
Utilizing the ZigBee protocol is pervasive in the context of smart homes, offering substantial convenience to individuals. However, smart home devices commonly handle significant quantities of real-world information, potentially giving rise to concerns related to information leakage. Therefore, in this study, we assess the security of a ZigBee smart homenetworkbyidentifying potential vulnerabilities and conducting a penetration test on the network. In addition, this study compared the potential damage inflicted on the ZigBee network bytechnical and non-technical users. Identifying the potential vulnerabilities was carried out by following a systematic literature review approach, while the penetration testing method was conducted with the help of a case study. The smart home network consisted of a gateway, a smart light bulb, a temperature and humidity sensor, and a motion sensor. The results show a vulnerability in the ZigBee protocol where the technical user could compromise all the security keys. However, the non-technical user was not able to compromise the ZigBee network. Consequently, the security of ZigBee-based smart devices still needs to be further investigated and strengthened. Finally, we discussed the future of the ZigBee network and the optimal scenarios for deploying it
- …
