Results 101-120 of 203.
![]() Faye, Sébastien ![]() ![]() ![]() in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering - Mobile Computing, Applications, and Services (2015, November) The continuous development of new technologies has led to the creation of a wide range of personal devices embedded with an ever increasing number of miniature sensors. With accelerometers and ... [more ▼] The continuous development of new technologies has led to the creation of a wide range of personal devices embedded with an ever increasing number of miniature sensors. With accelerometers and technologies such as Bluetooth and Wi-Fi, today's smartphones have the potential to monitor and record a complete history of their owners' movements as well as the context in which they occur. In this article, we focus on four complementary aspects related to the understanding of human behaviour. First, the use of smartwatches in combination with smartphones in order to detect different activities and associated physiological patterns. Next, the use of a scalable and energy-efficient data structure that can represent the detected signal shapes. Then, the use of a supervised classifier (i.e. Support Vector Machine) in parallel with a quantitative survey involving a dozen participants to achieve a deeper understanding of the influence of each collected metric and its use in detecting user activities and contexts. Finally, the use of novel representations to visualize the activities and social interactions of all the users, allowing the creation of quick and easy-to-understand comparisons. The tools used in this article are freely available online under a MIT licence. [less ▲] Detailed reference viewed: 436 (16 UL)![]() Faye, Sébastien ![]() ![]() ![]() in Proceedings of the 7th International Conference on Mobile Computing, Applications and Services (MobiCASE '15) (2015, November) SWIPE is a platform for sensing, recording and processing human dynamics using smart devices. The idea behind this type of system, which exists for the most part on smartphones, is to consider new metrics ... [more ▼] SWIPE is a platform for sensing, recording and processing human dynamics using smart devices. The idea behind this type of system, which exists for the most part on smartphones, is to consider new metrics from wearables - in our case smartwatches. These new devices, used in parallel with traditional smartphones, provide clear indicators of the activities and movements performed by the users who wear them. They can also sense environmental data and interactions. The SWIPE architecture is structured around two main elements, namely (1) an Android application deployed directly on the devices, allowing them to synchronize and collect data; and (2) a server for storing and processing the data. This publication is intended to communicate on the platform with both the scientific and the industry communities. SWIPE is freely distributed under a MIT license. [less ▲] Detailed reference viewed: 222 (4 UL)![]() ; Koenig, Vincent ![]() ![]() in Proceedings of the ACM Recsys CrowdRec Workshop 2015 (2015, September 19) In this paper, we describe a road traffic behaviour and mobility case study that was implemented in June 2015 in the congested city of Luxembourg. We explain the development and deployment of the Gamified ... [more ▼] In this paper, we describe a road traffic behaviour and mobility case study that was implemented in June 2015 in the congested city of Luxembourg. We explain the development and deployment of the Gamified mobile application Commutastic that offers users incentives to undertake after work activities. With Commutastic we try to persuade users to change their commuting time so as to avoid the evening peak. Furthermore we investigate the behaviour change with focus groups and questionnaires. The preliminary data indicates that behaviour change is possible and that traffic reduction can happen on a bigger scale. [less ▲] Detailed reference viewed: 113 (1 UL)![]() Östlund, Stefanie ![]() ![]() ![]() in Proceedings of the 8th International Conference on E-Learning (e-Learning'15) (2015, September) Detailed reference viewed: 298 (26 UL)![]() Bronzi, Walter ![]() ![]() ![]() in Ad Hoc Networks (2015) Detailed reference viewed: 274 (8 UL)![]() Lanze, Fabian ![]() ![]() ![]() in Proceedings of the IEEE International Symposium on Recent Advances of Trust, Security and Privacy in Computing and Communications (IEEE RATSP 2015), held in conjunction with IEEE TrustCom 2015 (2015, August) Detailed reference viewed: 271 (14 UL)![]() Mccall, Roderick ![]() ![]() in 8th International Conference on Human System Interaction (HSI'2015) (2015, June) This paper presents a comparative pilot usability study of Dasher and an on-screen keyboard on a head-mounted display. Interaction logging data was captured along with subjective responses (via the SUS ... [more ▼] This paper presents a comparative pilot usability study of Dasher and an on-screen keyboard on a head-mounted display. Interaction logging data was captured along with subjective responses (via the SUS questionnaire). The results indicate that there is a strong need to develop text entry systems for smart glasses rather to simply adopt those that are already available. However, both approaches are useful when there is a need to enter private or sensitive data. [less ▲] Detailed reference viewed: 336 (7 UL)![]() Codeca, Lara ![]() ![]() ![]() Presentation (2015, May 07) Various vehicular communities ranging from telecommunication to infrastructure are working on problems related to traffic congestion, intelligent transportation systems, and mobility patterns using ... [more ▼] Various vehicular communities ranging from telecommunication to infrastructure are working on problems related to traffic congestion, intelligent transportation systems, and mobility patterns using information collected from a variety of sensors. In order to test the solutions, the first step is to use a vehicular traffic simulator and an appropriate scenario. Many mobility simulators are available, but a common problem is finding a realistic traffic scenario. The aim of this work is to provide a scenario able to meet all the common requirements in terms of size, realism and duration, in order to have a common basis for the evaluations. In the interest of building a realistic scenario, we decided to start from a real city with a standard topology common in mid-size European cities, and real information concerning traffic demands and mobility patterns. In this paper we show the process used to build the Luxembourg SUMO Traffic (LuST) Scenario, and present a summary of its characteristics together with an overview of its possible uses. [less ▲] Detailed reference viewed: 466 (17 UL)![]() ; Gheorghe, Gabriela ![]() ![]() in Proc. of IFIP/IEEE International Symposium on Integrated Network Management (IM) (2015, May) Detailed reference viewed: 175 (7 UL)![]() Melakessou, Foued ![]() ![]() ![]() Scientific Conference (2015, April 08) The analysis of Call Detail Records has captured the attention of traffic and transportation researchers to optimize people's mobility. In our work, we would like to analyze Call Detail Records in order ... [more ▼] The analysis of Call Detail Records has captured the attention of traffic and transportation researchers to optimize people's mobility. In our work, we would like to analyze Call Detail Records in order to extract realistic human mobility models adapted to the Senegal use case. In this paper, we describe our analysis of the available D4D datasets. The first contribution is the modeling of the daily traffic demand profile of each antenna, by considering voice and short message services. The evaluation of mobility models will help to better design and develop future infrastructures in order to better support the actual demand. A classification has been performed into urban, suburban and rural modes. An algorithm has been developed to detect traffic anomalies in 2013, based on the daily profiles. The second contribution corresponds to the generation of inter-antennas and inter-arrondissements mobility graphs for each month of 2013. [less ▲] Detailed reference viewed: 163 (5 UL)![]() ![]() Derrmann, Thierry ![]() ![]() ![]() Scientific Conference (2015, April 08) In this work we propose a novel Cell Dwell Time Model that can be used to generate a synthetic population. We introduce two new metrics to define the attractivity of cell sites based on global and ... [more ▼] In this work we propose a novel Cell Dwell Time Model that can be used to generate a synthetic population. We introduce two new metrics to define the attractivity of cell sites based on global and individual parameters obtained via the analysis of the Data For Development (D4D) Call Detail Records (CDR). We rely on the shortest path road network to interconnect two distant cell sites. The resulting dwell time model can be used to compute accurate user trajectories even with partial information. This work represents a first step towards the generation of a synthetic population that can be used to perform a wide range of simulative studies to evaluate and optimize transportation networks. [less ▲] Detailed reference viewed: 254 (33 UL)![]() ; ; Frank, Raphaël ![]() in Vehicular Communications (2015), 2(2), 59-69 Detailed reference viewed: 155 (2 UL)![]() Gheorghe, Gabriela ![]() ![]() in Proc. of IEEE Conf. on Network Softwarization (NetSoft) (2015, April) Detailed reference viewed: 247 (11 UL)![]() Castignani, German ![]() ![]() ![]() in IEEE Intelligent Transportation Systems Magazine (2015), 7(1), 91-102 Today's smartphones and mobile devices typically embed advanced motion sensors. Due to their increasing market penetration, there is a potential for the development of distributed sensing platforms. In ... [more ▼] Today's smartphones and mobile devices typically embed advanced motion sensors. Due to their increasing market penetration, there is a potential for the development of distributed sensing platforms. In particular, over the last few years there has been an increasing interest in monitoring vehicles and driving data, aiming to identify risky driving maneuvers and to improve driver efficiency. Such a driver profiling system can be useful in fleet management, insurance premium adjustment, fuel consumption optimization or CO2 emission reduction. In this paper, we analyze how smartphone sensors can be used to identify driving maneuvers and propose SenseFleet, a driver profile platform that is able to detect risky driving events independently from the mobile device and vehicle. A fuzzy system is used to compute a score for the different drivers using real-time context information like route topology or weather conditions. To validate our platform, we present an evaluation study considering multiple drivers along a predefined path. The results show that our platform is able to accurately detect risky driving events and provide a representative score for each individual driver. [less ▲] Detailed reference viewed: 612 (50 UL)![]() Gheorghe, Gabriela ![]() ![]() in Berendt, Bettina; Engel, Thomas; Ikonomou, Demosthenes (Eds.) et al LNCS - Annual Privacy Forum 2015 - Bridging the gap between research and policy (2015) Detailed reference viewed: 216 (3 UL)![]() ; Palattella, Maria Rita ![]() ![]() in Proc. of IEEE Conf. on Standards for Communications & Networking (CSCN’15) (2015) Detailed reference viewed: 285 (6 UL)![]() Lanze, Fabian ![]() ![]() in Proceedings of the 12th Annual IEEE Consumer Communications & Networking Conference (CCNC 2015) (2015) The usage of public Wi-Fi hotspots has become a common routine in our everyday life. They are ubiquitous and offer fast and budget-friendly connectivity for various client devices. However, they are ... [more ▼] The usage of public Wi-Fi hotspots has become a common routine in our everyday life. They are ubiquitous and offer fast and budget-friendly connectivity for various client devices. However, they are exposed to a severe security threat: since 802.11 identifiers (SSID, BSSID) can be easily faked, an attacker can setup an evil twin, i.e., an access point (AP) that users are unable to distinguish from a legitimate one. Once a user connects to the evil twin, he inadvertently creates a playground for various attacks such as collection of sensitive data (e.g., credit card information, passwords) or man-in-the-middle attacks even on encrypted traffic. It is particularly alarming that this security flaw has led to the development of several tools that are freely available, easy to use and allow mounting the attack from commodity client devices such as laptops, smartphones or tablets without attracting attention. In this paper we provide a detailed overview of tools that have been developed (or can be misused) to set up evil twin APs. We inspect them thoroughly in order to identify characteristics that allow them to be distinguished from legitimate hardware-based access points. Our analysis has discovered three methods for detecting software-based APs. These exploit accuracy flaws due to emulation of hardware behavior or peculiarities of the client Wi-Fi hardware they operate on. Our evaluation with 60 hardware APs and a variety of tools on different platforms reveals enormous potential for reliable detection. Furthermore, our methods can be performed on typical client hardware within a short period of time without even connecting to a potentially untrustworthy access point. [less ▲] Detailed reference viewed: 303 (4 UL)![]() Palattella, Maria Rita ![]() in IEEE Sensors Journal (2015) Detailed reference viewed: 203 (12 UL)![]() Marchal, Samuel ![]() ![]() ![]() in IEEE Transactions on Network and Service Management (2014), 11(December), 458-471 Despite the growth of prevention techniques, phishing remains an important threat since the principal countermeasures in use are still based on reactive URL blacklisting. This technique is inefficient due ... [more ▼] Despite the growth of prevention techniques, phishing remains an important threat since the principal countermeasures in use are still based on reactive URL blacklisting. This technique is inefficient due to the short lifetime of phishing Web sites, making recent approaches relying on real-time or proactive phishing URL detection techniques more appropriate. In this paper, we introduce PhishStorm, an automated phishing detection system that can analyze in real time any URL in order to identify potential phishing sites. PhishStorm can interface with any email server or HTTP proxy. We argue that phishing URLs usually have few relationships between the part of the URL that must be registered (low-level domain) and the remaining part of the URL (upper-level domain, path, query). We show in this paper that experimental evidence supports this observation and can be used to detect phishing sites. For this purpose, we define the new concept of intra-URL relatedness and evaluate it using features extracted from words that compose a URL based on query data from Google and Yahoo search engines. These features are then used in machine-learning-based classification to detect phishing URLs from a real dataset. Our technique is assessed on 96 018 phishing and legitimate URLs that result in a correct classification rate of 94.91% with only 1.44% false positives. An extension for a URL phishingness rating system exhibiting high confidence rate ( $>$ 99%) is proposed. We discuss in this paper efficient implementation patterns that allow real-time analytics using Big Data architectures such as STORM and advanced data structures based on the Bloom filter. [less ▲] Detailed reference viewed: 650 (5 UL)![]() Bronzi, Walter ![]() ![]() ![]() in 2014 IEEE Vehicular Networking Conference (VNC) (2014, December) Bluetooth Low Energy (BLE) is quickly and steadily gaining importance for a wide range of applications. In this paper we investigate the potential of BLE in a vehicular context. By means of experiments ... [more ▼] Bluetooth Low Energy (BLE) is quickly and steadily gaining importance for a wide range of applications. In this paper we investigate the potential of BLE in a vehicular context. By means of experiments, we first evaluate the characteristics of the wireless channel, then we define a set of driving scenarios to analyze how BLE is affected by varying speed, distance and traffic conditions. We that found the maximum communication range between two devices can go beyond 100 meters and that a robust connection can be achieved up to a distance of 50 meters even for varying traffic and driving conditions. Next, we present a proof-of-concept mobile application for off-the-shelf smartphones that can be used to transmit data over multiple hops. Finally we discuss the advantages and limitations of BLE for Inter-Vehicular Communications (IVC) and propose potential applications. [less ▲] Detailed reference viewed: 230 (11 UL) |
||