The Experts below are selected from a list of 1836 Experts worldwide ranked by ideXlab platform
Honggang Wang - One of the best experts on this subject based on the ideXlab platform.
-
Toward trustworthy vehicular social networks
IEEE Communications Magazine, 2015Co-Authors: Qing Yang, Honggang WangAbstract:Wireless vehicular networks offer the promise of connectivity to vehicles that could provide a myriad of safety and driving-enhancing services to drivers and passengers. With wireless technology available in each car, it is expected that huge amounts of information will be exchanged between vehicles or between vehicles and roadside infrastructure. Due to defective sensors, software viruses, or even Malicious Intent, legitimate vehicles might inject untrustworthy information into the network. Besides relying on the public key infrastructure, this article proposes a social network approach to study trustworthy information sharing in a vehicular network. We first cover recent research progress in measuring direct trust and modeling indirect trust in online social networks, and then discuss how to apply them to vehicular social networks despite several pressing research challenges.
Qing Yang - One of the best experts on this subject based on the ideXlab platform.
-
Toward trustworthy vehicular social networks
IEEE Communications Magazine, 2015Co-Authors: Qing Yang, Honggang WangAbstract:Wireless vehicular networks offer the promise of connectivity to vehicles that could provide a myriad of safety and driving-enhancing services to drivers and passengers. With wireless technology available in each car, it is expected that huge amounts of information will be exchanged between vehicles or between vehicles and roadside infrastructure. Due to defective sensors, software viruses, or even Malicious Intent, legitimate vehicles might inject untrustworthy information into the network. Besides relying on the public key infrastructure, this article proposes a social network approach to study trustworthy information sharing in a vehicular network. We first cover recent research progress in measuring direct trust and modeling indirect trust in online social networks, and then discuss how to apply them to vehicular social networks despite several pressing research challenges.
Suman Banerjee - One of the best experts on this subject based on the ideXlab platform.
-
Towards Secure Localization Using Wireless "Congruity'
Eighth IEEE Workshop on Mobile Computing Systems and Applications, 2007Co-Authors: Arunesh Mishra, Shravan Rayanchu, Ashutosh Shukla, Suman BanerjeeAbstract:Traditional methods for localization in wireless networks rely on the correlation of the received signal strength with physical distance. It is also well known, that these mechanisms fail in an adversarial setting due to the lack of robustness of the signal strength property to Malicious Intent. In this paper, we present a property of the wireless medium, which we call "wireless congruity', that captures the relative similarities in wireless media characteristics (such as packet receptions, idle channel time, etc.) as observed by two receivers that are in physical proximity of each other. We show that wireless congruity holds promise for secure localization by presenting an initial yet encouraging set of results obtained through extensive experimentation in a rich indoor wireless environment.
-
HotMobile - Towards Secure Localization Using Wireless "Congruity'
Eighth IEEE Workshop on Mobile Computing Systems and Applications, 2007Co-Authors: Arunesh Mishra, Shravan Rayanchu, Ashutosh Shukla, Suman BanerjeeAbstract:Traditional methods for localization in wireless networks rely on the correlation of the received signal strength with physical distance. It is also well known, that these mechanisms fail in an adversarial setting due to the lack of robustness of the signal strength property to Malicious Intent. In this paper, we present a property of the wireless medium, which we call "wireless congruity', that captures the relative similarities in wireless media characteristics (such as packet receptions, idle channel time, etc.) as observed by two receivers that are in physical proximity of each other. We show that wireless congruity holds promise for secure localization by presenting an initial yet encouraging set of results obtained through extensive experimentation in a rich indoor wireless environment.
Gabriel C. Birch - One of the best experts on this subject based on the ideXlab platform.
-
ICCST - Counter Unmanned Aerial System Security Education
2018 International Carnahan Conference on Security Technology (ICCST), 2018Co-Authors: Jaclynn J. Stubbs, Camron G. Kouhestani, Gabriel C. BirchAbstract:Unmanned aircraft system (UAS) technologies have gained immense popularity in the commercial sector and have enabled capabilities that were not available just a short time ago. Once limited to the domain of highly skilled hobbyists or precision military instruments, consumer UAS are now widespread due to increased computational power, manufacturing techniques, and numerous commercial applications. The rise of consumer UAS and the low barrier to entry necessary to utilize these systems provides an increased potential for using a UAS as a delivery platform for Malicious Intent. This creates a new security concern which must be addressed. The contribution presented in this work is the realization of counter UAS security technology concepts viewed through the traditional security framework and the associated challenges to such a framework.
-
Counter Unmanned Aerial System Security Education
2018 International Carnahan Conference on Security Technology (ICCST), 2018Co-Authors: Jaclynn J. Stubbs, Camron G. Kouhestani, Gabriel C. BirchAbstract:Unmanned aircraft system (UAS) technologies have gained immense popularity in the commercial sector and have enabled capabilities that were not available just a short time ago. Once limited to the domain of highly skilled hobbyists or precision military instruments, consumer UAS are now widespread due to increased computational power, manufacturing techniques, and numerous commercial applications. The rise of consumer UAS and the low barrier to entry necessary to utilize these systems provides an increased potential for using a UAS as a delivery platform for Malicious Intent. This creates a new security concern which must be addressed. The contribution presented in this work is the realization of counter UAS security technology concepts viewed through the traditional security framework and the associated challenges to such a framework.
Yuki Sawa - One of the best experts on this subject based on the ideXlab platform.
-
ICSC - Detecting Phishing Attacks Using Natural Language Processing and Machine Learning
2018 IEEE 12th International Conference on Semantic Computing (ICSC), 2020Co-Authors: Tianrui Peng, Ian G. Harris, Yuki SawaAbstract:Phishing attacks are one of the most common and least defended security threats today. We present an approach which uses natural language processing techniques to analyze text and detect inappropriate statements which are indicative of phishing attacks. Our approach is novel compared to previous work because it focuses on the natural language text contained in the attack, performing semantic analysis of the text to detect Malicious Intent. To demonstrate the effectiveness of our approach, we have evaluated it using a large benchmark set of phishing emails.
-
Detecting Phishing Attacks Using Natural Language Processing and Machine Learning
2018 IEEE 12th International Conference on Semantic Computing (ICSC), 2018Co-Authors: Tianrui Peng, Ian Harris, Yuki SawaAbstract:Phishing attacks are one of the most common and least defended security threats today. We present an approach which uses natural language processing techniques to analyze text and detect inappropriate statements which are indicative of phishing attacks. Our approach is novel compared to previous work because it focuses on the natural language text contained in the attack, performing semantic analysis of the text to detect Malicious Intent. To demonstrate the effectiveness of our approach, we have evaluated it using a large benchmark set of phishing emails.