191 research outputs found
Iron Polypyridyl Catalysts Assembled on Metal Oxide Semiconductors for Heterogeneous Photocatalytic Hydrogen Generation
Artificial Photosynthesis (AP) provides a promising method for the conversion of solar energy to chemical fuel in the form of H2 and O2. Development of heterogeneous systems in which H2 evolution catalysts are immobilized on metal oxide semiconductors is imperative for the large-scale implementation of AP systems. This research focuses on the immobilization of an active H2 evolution catalyst on large band gap semiconductors for the development and optimization of a highly active photocatalytic H2 generation system
iCapture: Facilitating Spontaneous User-Interaction with Pervasive Displays using Smart Devices
Abstract. The eCampus project at Lancaster University is an inter-disciplinary project aiming to deploy a wide range of situated displays across the University campus in order to create a large per-vasive communications infrastructure. At present, we are conducting a series of parallel research activities in order to investigate how the pervasive communications infrastructure can support the daily needs of staff, students and visitors to the University. This paper introduces one of our current research investigations into how one is able to mediate spontaneous interaction with the pervasive display infrastructure through camera equipped mobile phones (i.e. smart devices).
Intrusion Detection Systems for Community Wireless Mesh Networks
Wireless mesh networks are being increasingly used to provide affordable network connectivity to communities where wired deployment strategies are either not possible or are prohibitively expensive. Unfortunately, computer networks (including mesh networks) are frequently being exploited by increasingly profit-driven and insidious attackers, which can affect their utility for legitimate use. In response to this, a number of countermeasures have been developed, including intrusion detection systems that aim to detect anomalous behaviour caused by attacks. We present a set of socio-technical challenges associated with developing an intrusion detection system for a community wireless mesh network. The attack space on a mesh network is particularly large; we motivate the need for and describe the challenges of adopting an asset-driven approach to managing this space. Finally, we present an initial design of a modular architecture for intrusion detection, highlighting how it addresses the identified challenges
Dataset on usage of a live & VoD P2P IPTV service
This paper presents a dataset of user statistics collected from a P2P multimedia service infrastructure that delivers both live and on-demand content in high quality to users via different platforms: PC/Mac, and set top boxes. The dataset covers a period of seven months starting from October 2011, exposing a total of over 94k system statistic reports from thousands of user devices at a fine granularity. Such rich data source is made available to fellow researchers to aid in developing better understanding of video delivery mechanisms, user behaviour, and programme popularity evolution
Citrus:Orchestrating Security Mechanisms via Adversarial Deception
Despite the Internet being an apex of human achievement for many years, sophisticated targeted attacks are becoming more prevalent than ever before. Large scale data collection using threat sources such as honeypots have recently been employed to gather information relating to these attacks. While this data naturally details attack properties, there exists challenges in extracting the relevant information from vast data sets to provide valuable insight and a standard description of the attack. Traditionally, threats are identified through the use of signatures that are crafted manually through the composition of IOCs (Indicators of Compromise) extracted from telemetry captured during an attack process, which is often administered by an experienced engineer. These signatures have been proven effective in their use by IDSs (Intrusion Detection Systems) to detect emerging threats. However, little research has been made in automating the extraction of emerging IOCs and the generation of corresponding signatures which incorporate host artefacts. In this paper we present Citrus: a novel approach to the generation of signatures by incorporating host based telemetry extracted from honeypot endpoints. Leveraging this visibility at an endpoint grants a detailed understanding of bleeding edge attack tactics, techniques, and procedures gathered from host logs
P4ID:P4 Enhanced Intrusion Detection
The growth in scale and capacity of networks in recent years leads to challenges of positioning and scalability of Intrusion Detection Systems (IDS). With the flexibility afforded by programmable dataplanes, it is now possible to perform a new level of intrusion detection in switches themselves. We present P4ID, combining a rule parser, stateless and stateful packet processing using P4, and evaluate it using publicly available datasets. We show that using this technique, we can achieve a significant reduction in traffic being processed by an IDS
Vision social TV:towards personalised media experience and community atmosphere
The traditional TV viewing experience is being greatly influenced by the emerging social medias and online content distribution technologies. Social TV is becoming a hot topic in the media industry. The demo introduces a social TV platform, which enables the research and experimentation of personalised media experience and community atmosphere
λBGP:Rethinking BGP programmability
BGP has long been the de-facto control plane protocol for inter-network connectivity. Although initially designed to provide best-effort routing between ASes, the evolution of Internet services has created a demand for more complex control functionalities using the protocol. At the heart of this challenge lies the static nature of configuration mechanisms and the limited programmability of existing BGP speakers. Meanwhile, the SDN paradigm has demonstrated that open and generic network control APIs can greatly improve network functionality and seamlessly enable greater flexibility in network management. In this paper, we argue that BGP speaking systems can and should provide an open and rich control and configuration mechanism, in order to address modern era network control requirements. Towards this goal, we present λbgp, a modular and extensible BGP framework written in Haskell. The framework offers an extensible integration model for reactive BGP control that remains backward compatible with existing BGP standards and allows network managers to define route processing policies using a high-level language and to dynamically inject information sources into the path selection logic. Using a high-performance BGP traffic generator, we demonstrate that λbgp offers performance comparable to production BGP speakers, while dynamic AS route processing policies can be written in just a few lines of code
Social telemedia: the relationship between social information and networked media
Social telemedia is a cross-breeding of social networks and networked media that allows users to capture and share live events collaboratively on mobile devices
Designing Mobile Augmented Reality interfaces for locative games and playful experiences
Mobile Augmented Reality (MAR) has predominantly been used in locative games and playful experiences for the presentation on virtual game objects in conjunction with separate 2-D maps for navigation. This distinct switch in interaction modalities can detract from the game play experience and will arguably be less relevant for AR glasses. Therefore this research considers the application techniques from graphic design to MAR interfaces to provide an effective means of navigation through a physical game space without maps. To illustrate this approach we present a MAR application that provides a playful way for visitors to explore a small rural village in both space and time in relation to its main cultural event, the annual Scarecrow Festival. In particular we present the considerations that designers must address when creating purely augmented reality navigation interfaces through the design, implementation, and user evaluation of the application scARecrow Time Machine
- …