191 research outputs found

    Iron Polypyridyl Catalysts Assembled on Metal Oxide Semiconductors for Heterogeneous Photocatalytic Hydrogen Generation

    Get PDF
    Artificial Photosynthesis (AP) provides a promising method for the conversion of solar energy to chemical fuel in the form of H2 and O2. Development of heterogeneous systems in which H2 evolution catalysts are immobilized on metal oxide semiconductors is imperative for the large-scale implementation of AP systems. This research focuses on the immobilization of an active H2 evolution catalyst on large band gap semiconductors for the development and optimization of a highly active photocatalytic H2 generation system

    iCapture: Facilitating Spontaneous User-Interaction with Pervasive Displays using Smart Devices

    Get PDF
    Abstract. The eCampus project at Lancaster University is an inter-disciplinary project aiming to deploy a wide range of situated displays across the University campus in order to create a large per-vasive communications infrastructure. At present, we are conducting a series of parallel research activities in order to investigate how the pervasive communications infrastructure can support the daily needs of staff, students and visitors to the University. This paper introduces one of our current research investigations into how one is able to mediate spontaneous interaction with the pervasive display infrastructure through camera equipped mobile phones (i.e. smart devices).

    Intrusion Detection Systems for Community Wireless Mesh Networks

    Get PDF
    Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive. Unfortunately, computer networks (including mesh networks) are frequently being exploited by increasingly profit-driven and insidious attackers, which can affect their utility for legitimate use. In response to this, a number of countermeasures have been developed, including intrusion detection systems that aim to detect anomalous behaviour caused by attacks. We present a set of socio-technical challenges associated with developing an intrusion detection system for a community wireless mesh network. The attack space on a mesh network is particularly large; we motivate the need for and describe the challenges of adopting an asset-driven approach to managing this space. Finally, we present an initial design of a modular architecture for intrusion detection, highlighting how it addresses the identified challenges

    Dataset on usage of a live & VoD P2P IPTV service

    Get PDF
    This paper presents a dataset of user statistics collected from a P2P multimedia service infrastructure that delivers both live and on-demand content in high quality to users via different platforms: PC/Mac, and set top boxes. The dataset covers a period of seven months starting from October 2011, exposing a total of over 94k system statistic reports from thousands of user devices at a fine granularity. Such rich data source is made available to fellow researchers to aid in developing better understanding of video delivery mechanisms, user behaviour, and programme popularity evolution

    Citrus:Orchestrating Security Mechanisms via Adversarial Deception

    Get PDF
    Despite the Internet being an apex of human achievement for many years, sophisticated targeted attacks are becoming more prevalent than ever before. Large scale data collection using threat sources such as honeypots have recently been employed to gather information relating to these attacks. While this data naturally details attack properties, there exists challenges in extracting the relevant information from vast data sets to provide valuable insight and a standard description of the attack. Traditionally, threats are identified through the use of signatures that are crafted manually through the composition of IOCs (Indicators of Compromise) extracted from telemetry captured during an attack process, which is often administered by an experienced engineer. These signatures have been proven effective in their use by IDSs (Intrusion Detection Systems) to detect emerging threats. However, little research has been made in automating the extraction of emerging IOCs and the generation of corresponding signatures which incorporate host artefacts. In this paper we present Citrus: a novel approach to the generation of signatures by incorporating host based telemetry extracted from honeypot endpoints. Leveraging this visibility at an endpoint grants a detailed understanding of bleeding edge attack tactics, techniques, and procedures gathered from host logs

    P4ID:P4 Enhanced Intrusion Detection

    Get PDF
    The growth in scale and capacity of networks in recent years leads to challenges of positioning and scalability of Intrusion Detection Systems (IDS). With the flexibility afforded by programmable dataplanes, it is now possible to perform a new level of intrusion detection in switches themselves. We present P4ID, combining a rule parser, stateless and stateful packet processing using P4, and evaluate it using publicly available datasets. We show that using this technique, we can achieve a significant reduction in traffic being processed by an IDS

    Vision social TV:towards personalised media experience and community atmosphere

    Get PDF
    The traditional TV viewing experience is being greatly influenced by the emerging social medias and online content distribution technologies. Social TV is becoming a hot topic in the media industry. The demo introduces a social TV platform, which enables the research and experimentation of personalised media experience and community atmosphere

    λBGP:Rethinking BGP programmability

    Get PDF
    BGP has long been the de-facto control plane protocol for inter-network connectivity. Although initially designed to provide best-effort routing between ASes, the evolution of Internet services has created a demand for more complex control functionalities using the protocol. At the heart of this challenge lies the static nature of configuration mechanisms and the limited programmability of existing BGP speakers. Meanwhile, the SDN paradigm has demonstrated that open and generic network control APIs can greatly improve network functionality and seamlessly enable greater flexibility in network management. In this paper, we argue that BGP speaking systems can and should provide an open and rich control and configuration mechanism, in order to address modern era network control requirements. Towards this goal, we present λbgp, a modular and extensible BGP framework written in Haskell. The framework offers an extensible integration model for reactive BGP control that remains backward compatible with existing BGP standards and allows network managers to define route processing policies using a high-level language and to dynamically inject information sources into the path selection logic. Using a high-performance BGP traffic generator, we demonstrate that λbgp offers performance comparable to production BGP speakers, while dynamic AS route processing policies can be written in just a few lines of code

    Social telemedia: the relationship between social information and networked media

    Get PDF
    Social telemedia is a cross-breeding of social networks and networked media that allows users to capture and share live events collaboratively on mobile devices

    Designing Mobile Augmented Reality interfaces for locative games and playful experiences

    Get PDF
    Mobile Augmented Reality (MAR) has predominantly been used in locative games and playful experiences for the presentation on virtual game objects in conjunction with separate 2-D maps for navigation. This distinct switch in interaction modalities can detract from the game play experience and will arguably be less relevant for AR glasses. Therefore this research considers the application techniques from graphic design to MAR interfaces to provide an effective means of navigation through a physical game space without maps. To illustrate this approach we present a MAR application that provides a playful way for visitors to explore a small rural village in both space and time in relation to its main cultural event, the annual Scarecrow Festival. In particular we present the considerations that designers must address when creating purely augmented reality navigation interfaces through the design, implementation, and user evaluation of the application scARecrow Time Machine
    corecore