Explore PETRAS's research knowledge base of peer reviewed, multidisciplinary publications.
301. Jhumka, Arshad; Bradbury, Matthew: Deconstructing source location privacy-aware routing protocols. In: SAC '17: Proceedings of the Symposium on Applied Computing, ACM, 2017. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-jhumka_deconstructing_2017,
title = {Deconstructing source location privacy-aware routing protocols},
author = {Arshad Jhumka and Matthew Bradbury},
url = {https://doi.org/10.1145%2F3019612.3019655},
doi = {10.1145/3019612.3019655},
year = {2017},
date = {2017-04-03},
booktitle = {SAC '17: Proceedings of the Symposium on Applied Computing},
publisher = {ACM},
abstract = {Source location privacy (SLP) is becoming an important property for a large class of security-critical wireless sensor network applications such as monitoring and tracking. Much of the previous work on SLP have focused on the development of various protocols to enhance the level of SLP imparted to the network, under various attacker models and other conditions. Others works have focused on analysing the level of SLP being imparted by a specific protocol.
In this paper, we focus on deconstructing routing-based SLP protocols to enable a better understanding of their structure. We argue that the SLP-aware routing protocols can be classified into two main categories, namely (i) spatial and (ii) temporal. Based on this, we show that there are three important components, namely (i) decoy selection, (ii) use and routing of control messages and (iii) use and routing of decoy messages. The decoy selection technique imparts the spatial or temporal property of SLP-aware routing. We show the viability of the framework through the construction of well-known SLP-aware routing protocols using the identified components.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
In this paper, we focus on deconstructing routing-based SLP protocols to enable a better understanding of their structure. We argue that the SLP-aware routing protocols can be classified into two main categories, namely (i) spatial and (ii) temporal. Based on this, we show that there are three important components, namely (i) decoy selection, (ii) use and routing of control messages and (iii) use and routing of decoy messages. The decoy selection technique imparts the spatial or temporal property of SLP-aware routing. We show the viability of the framework through the construction of well-known SLP-aware routing protocols using the identified components.302. Gu, Chen; Bradbury, Matthew; Jhumka, Arshad: Phantom walkabouts in wireless sensor networks. In: SAC '17: Proceedings of the Symposium on Applied Computing, ACM, 2017. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-gu_phantom_2017,
title = {Phantom walkabouts in wireless sensor networks},
author = {Chen Gu and Matthew Bradbury and Arshad Jhumka},
url = {https://doi.org/10.1145%2F3019612.3019732},
doi = {10.1145/3019612.3019732},
year = {2017},
date = {2017-04-03},
booktitle = {SAC '17: Proceedings of the Symposium on Applied Computing},
publisher = {ACM},
abstract = {As wireless sensor networks (WSNs) have been applied across a spectrum of application domains, the problem of source location privacy (SLP) has emerged as a significant issue, particularly in security-critical situations. In the seminal work on SLP, phantom routing was proposed as a viable approach to address SLP. However, recent work has shown some limitations of phantom routing such as poor performance with multiple sources. In this paper, we propose phantom walkabouts, a novel version and more general version of phantom routing, which performs phantom routes of variable lengths. Through extensive simulations we show that phantom walkabouts provides high SLP levels with a low message overhead and hence, low energy usage.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
303. Wang, Xin; Madaan, Aastha; Siow, Eugene; Tiropanis, Thanassis: Sharing Databases on the Web with Porter Proxy. In: WWW '17 Companion: Proceedings of the 26th International Conference on World Wide Web Companion, ACM Press, 2017. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-wang_sharing_2017,
title = {Sharing Databases on the Web with Porter Proxy},
author = {Xin Wang and Aastha Madaan and Eugene Siow and Thanassis Tiropanis},
url = {https://doi.org/10.1145%2F3041021.3051694},
doi = {10.1145/3041021.3051694},
year = {2017},
date = {2017-04-03},
booktitle = {WWW '17 Companion: Proceedings of the 26th International Conference on World Wide Web Companion},
publisher = {ACM Press},
abstract = {With large number of datasets now available through the Web, data-sharing ecosystems such as the Web Observatory have emerged. The Web Observatory provides an active decentralised ecosystem for datasets and applications based on a number Web Observatory sites, each of which can run in a different administrative domain. On a Web Observatory site users can publish and securely access datasets across domains via a harmonised API and reverse proxies for access control. However, that API provides a different interface to that of the databases on which datasets are stored and, consequently, existing applications that consume data from specific databases require major modification to be added to the Web Observatory ecosystem. In this paper we propose a lightweight architecture called Porter Proxy to address this concern. Porter Proxy exposes the same interfaces as databases as requested by the users while enforcing access control. Characteristics of the proposed Porter Proxy architecture are evaluated based on adversarial scenario-handling in Web Observatory eco-system.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
304. Whitty, Monica T.; Edwards, Matthew John; Levi, Michael; Peersman, Claudia; Rashid, Awais; Sasse, Angela; Sorell, Tom; Stringhini, Gianluca: Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF). In: WWW '17 Companion: Proceedings of the 26th International Conference on World Wide Web Companion, ACM Press, 2017. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-whitty_ethical_2017,
title = {Ethical and Social Challenges with developing Automated Methods to Detect and Warn potential victims of Mass-marketing Fraud (MMF)},
author = {Monica T. Whitty and Matthew John Edwards and Michael Levi and Claudia Peersman and Awais Rashid and Angela Sasse and Tom Sorell and Gianluca Stringhini},
url = {https://doi.org/10.1145%2F3041021.3053891},
doi = {10.1145/3041021.3053891},
year = {2017},
date = {2017-04-03},
booktitle = {WWW '17 Companion: Proceedings of the 26th International Conference on World Wide Web Companion},
publisher = {ACM Press},
abstract = {Mass-marketing frauds (MMFs) are on the increase. Given the amount of monies lost and the psychological impact of MMFs there is an urgent need to develop new and effective methods to prevent more of these crimes. This paper reports the early planning of automated methods our interdisciplinary team are developing to prevent and detect MMF. Importantly, the paper presents the ethical and social constraints involved in such a model and suggests concerns others might also consider when developing automated systems.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
305. Kolodenker, Eugene; Koch, William; Stringhini, Gianluca; Egele, Manuel: PayBreak: Defense Against Cryptographic Ransomware. In: ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, ACM, 2017. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-kolodenker_paybreak_2017,
title = {PayBreak: Defense Against Cryptographic Ransomware},
author = {Eugene Kolodenker and William Koch and Gianluca Stringhini and Manuel Egele},
url = {https://doi.org/10.1145%2F3052973.3053035},
doi = {10.1145/3052973.3053035},
year = {2017},
date = {2017-04-02},
booktitle = {ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security},
publisher = {ACM},
abstract = {Similar to criminals in the physical world, cyber-criminals use a variety of illegal and immoral means to achieve monetary gains. Recently, malware known as ransomware started to leverage strong cryptographic primitives to hold victims' computer files "hostage" until a ransom is paid. Victims, with no way to defend themselves, are often advised to simply pay. Existing defenses against ransomware rely on ad-hoc mitigations that target the incorrect use of cryptography rather than generic live protection. To fill this gap in the defender's arsenal, we describe the approach, prototype implementation, and evaluation of a novel, automated, and most importantly proactive defense mechanism against ransomware. Our prototype, called PayBreak, effectively combats ransomware, and keeps victims' files safe.
PayBreak is based on the insight that secure file encryption relies on hybrid encryption where symmetric session keys are used on the victim computer. PayBreak observes the use of these keys, holds them in escrow, and thus, can decrypt files that would otherwise only be recoverable by paying the ransom. Our prototype leverages low overhead dynamic hooking techniques and asymmetric encryption to realize the key escrow mechanism which allows victims to restore the files encrypted by ransomware. We evaluated PayBreak for its effectiveness against twenty hugely successful families of real-world ransomware, and demonstrate that our system can restore all files that are encrypted by samples from twelve of these families, including the infamous CryptoLocker, and more recent threats such as Locky and SamSam. Finally, PayBreak performs its protection task at negligible performance overhead for common office workloads and is thus ideally suited as a proactive online protection system.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
PayBreak is based on the insight that secure file encryption relies on hybrid encryption where symmetric session keys are used on the victim computer. PayBreak observes the use of these keys, holds them in escrow, and thus, can decrypt files that would otherwise only be recoverable by paying the ransom. Our prototype leverages low overhead dynamic hooking techniques and asymmetric encryption to realize the key escrow mechanism which allows victims to restore the files encrypted by ransomware. We evaluated PayBreak for its effectiveness against twenty hugely successful families of real-world ransomware, and demonstrate that our system can restore all files that are encrypted by samples from twelve of these families, including the infamous CryptoLocker, and more recent threats such as Locky and SamSam. Finally, PayBreak performs its protection task at negligible performance overhead for common office workloads and is thus ideally suited as a proactive online protection system.306. Cath, Corinne; Wachter, Sandra; Mittelstadt, Brent Daniel; Taddeo, Mariarosaria; Floridi, Luciano: Artificial Intelligence and the `Good Society': the US, EU, and UK approach. In: 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-cath_artificial_2017,
title = {Artificial Intelligence and the `Good Society': the US, EU, and UK approach},
author = {Corinne Cath and Sandra Wachter and Brent Daniel Mittelstadt and Mariarosaria Taddeo and Luciano Floridi},
url = {https://doi.org/10.1007%2Fs11948-017-9901-7},
doi = {10.1007/s11948-017-9901-7},
year = {2017},
date = {2017-03-28},
publisher = {Springer Science and Business Media LLC},
abstract = {In October 2016, the White House, the European Parliament, and the UK House of Commons each issued a report outlining their visions on how to prepare society for the widespread use of artificial intelligence (AI). In this article, we provide a comparative assessment of these three reports in order to facilitate the design of policies favourable to the development of a 'good AI society'. To do so, we examine how each report addresses the following three topics: (a) the development of a 'good AI society'; (b) the role and responsibility of the government, the private sector, and the research community (including academia) in pursuing such a development; and (c) where the recommendations to support such a development may be in need of improvement. Our analysis concludes that the reports address adequately various ethical, social, and economic topics, but come short of providing an overarching political vision and long-term strategy for the development of a 'good AI society'. In order to contribute to fill this gap, in the conclusion we suggest a two-pronged approach.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
307. Taddeo, Mariarosaria: Data Philanthropy and Individual Rights. In: vol. 27, no. 1, pp. 1–5, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-taddeo_data_2017,
title = {Data Philanthropy and Individual Rights},
author = {Mariarosaria Taddeo},
url = {https://doi.org/10.1007%2Fs11023-017-9429-2},
doi = {10.1007/s11023-017-9429-2},
year = {2017},
date = {2017-03-16},
volume = {27},
number = {1},
pages = {1--5},
publisher = {Springer Science and Business Media LLC},
abstract = {Data Philanthropy-the donation of data from private companies-is becoming increasing more popular, as corporations, like Genentech and PfizerFootnote1 donate their data, and international organisations, like the UN, start to create the infrastructure to facilitate the sharing of corporate-owned data (Kirkpatrick 2013).
However, competing tensions on data control and ownership (Kaisler et al. 2013; Andrejevic 2014; Kostkova et al. 2016), limited technical understanding, and the lack of adequate frameworks for coordination and governance (Mayer-Sch\"{o}nberger and Kenneth 2013; Vayena et al. 2015) pose serious obstacles to the attempts to share data among different actors, especially when these include private corporations. This was the case, for example, in 2014 during the Ebola crisis in West Africa, when gaining access to mobile network operators' data on population movement would have facilitated tracking the spreading of the disease, but proved to be impossible, because of issues concerning commercial interests, users' privacy, national security, as well as regulatory uncertainty.
Understanding how to access these data and how to harness their value for the common good is one of the main challenges of this decade.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
However, competing tensions on data control and ownership (Kaisler et al. 2013; Andrejevic 2014; Kostkova et al. 2016), limited technical understanding, and the lack of adequate frameworks for coordination and governance (Mayer-Schönberger and Kenneth 2013; Vayena et al. 2015) pose serious obstacles to the attempts to share data among different actors, especially when these include private corporations. This was the case, for example, in 2014 during the Ebola crisis in West Africa, when gaining access to mobile network operators' data on population movement would have facilitated tracking the spreading of the disease, but proved to be impossible, because of issues concerning commercial interests, users' privacy, national security, as well as regulatory uncertainty.
Understanding how to access these data and how to harness their value for the common good is one of the main challenges of this decade.308. Catlow, Ruth; Garrett, Marc; Jones, Nathan; Skinner, Sam (Ed.): Artists Re:Thinking the Blockchain. Torque Editions & Furtherfield, 2017, ISBN: 978-0-9932487-4-0. (Type: Collection | Abstract | Links | BibTeX) @collection{col-catlow_artists_2017,
title = {Artists Re:Thinking the Blockchain},
editor = {Ruth Catlow and Marc Garrett and Nathan Jones and Sam Skinner},
url = {https://eprints.lancs.ac.uk/id/eprint/124584/1/ArtistsReThinkingTheBlockchain.pdf},
isbn = {978-0-9932487-4-0},
year = {2017},
date = {2017-03-12},
publisher = {Torque Editions \& Furtherfield},
abstract = {A future-artefact of a time before the blockchain changed the world. This interdisciplinary book includes artistic, theoretical and documentary engagements with the technology some have described as the new internet.
With contributions by Jaya Klara Brekke, Theodoros Chiotis, Ami Clarke, Simon Denny, Design Informatics Research Centre, Max
Dovey, Mat Dryhurst, Rachel O'Dwyer, C\'{e}sar Escudero Andaluz, Primavera De Filippi, Rory Gianni, Peter Gomes, Elias Haase, Juhee Hahm, Max Hampshire, Kimberley ter Heerdt, Holly Herndon, Helen Kaplinsky, Paul Kolling, Elli Kuru\c{s}, Nikki Loef, Rob Myers, Mart\'{i}n Nadal, Noemata (Bj\orn Magnhild\oen), Edward Picot, PWR Studio, Paul Seidler, Surfatial, Hito Steyerl, Lina Theodorou, Pablo Velasco, Ben Vickers, Mark Waugh, Cecilia Wee, Martin Zeilinger.'Furtherfield and Torque have brought us a collection of writings and art that cut through the mainstream blockchain hype and reveal the diverse creative visions that can be embedded into the technology. The book strikes a great balance between technical explanation of blockchains, cryptocurrency and smart contracts and the broader politics, culture and philosophy that surrounds the innovations. Above all, it inspires us to believe we can still invent our own futures and grow the technologies that we need to realise them.' - Brett Scott, author of The Heretic's Guide to Global Finance: Hacking the Future of Money
'This book is on a mission to make one of the most influential yet unknown technologies of today intelligible for each and every one of us.' - Josephine Bosma, author of Nettitudes - Let's Talk Net Art},
keywords = {},
pubstate = {published},
tppubtype = {collection}
}
With contributions by Jaya Klara Brekke, Theodoros Chiotis, Ami Clarke, Simon Denny, Design Informatics Research Centre, Max
Dovey, Mat Dryhurst, Rachel O'Dwyer, César Escudero Andaluz, Primavera De Filippi, Rory Gianni, Peter Gomes, Elias Haase, Juhee Hahm, Max Hampshire, Kimberley ter Heerdt, Holly Herndon, Helen Kaplinsky, Paul Kolling, Elli Kuruş, Nikki Loef, Rob Myers, Martín Nadal, Noemata (Bjørn Magnhildøen), Edward Picot, PWR Studio, Paul Seidler, Surfatial, Hito Steyerl, Lina Theodorou, Pablo Velasco, Ben Vickers, Mark Waugh, Cecilia Wee, Martin Zeilinger.'Furtherfield and Torque have brought us a collection of writings and art that cut through the mainstream blockchain hype and reveal the diverse creative visions that can be embedded into the technology. The book strikes a great balance between technical explanation of blockchains, cryptocurrency and smart contracts and the broader politics, culture and philosophy that surrounds the innovations. Above all, it inspires us to believe we can still invent our own futures and grow the technologies that we need to realise them.' - Brett Scott, author of The Heretic's Guide to Global Finance: Hacking the Future of Money
'This book is on a mission to make one of the most influential yet unknown technologies of today intelligible for each and every one of us.' - Josephine Bosma, author of Nettitudes - Let's Talk Net Art309. Blythe, John M.; Michie, Susan; Watson, Jeremy Daniel McKendrick; Lefevre, Carmen E.: Internet of Things in Healthcare: Identifying key malicious threats, end-user protective and problematic behaviours. In: 3rd UCL Centre for Behaviour Change Digital Health Conference 2017: Harnessing digital technology for behaviour change, London, UK, 2017. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-blythe_internet_2017,
title = {Internet of Things in Healthcare: Identifying key malicious threats, end-user protective and problematic behaviours},
author = {John M. Blythe and Susan Michie and Jeremy Daniel McKendrick Watson and Carmen E. Lefevre},
url = {https://www.frontiersin.org/10.3389/conf.FPUBH.2017.03.00021/event_abstract},
doi = {10.3389/conf.FPUBH.2017.03.00021},
year = {2017},
date = {2017-02-22},
booktitle = {3rd UCL Centre for Behaviour Change Digital Health Conference 2017: Harnessing digital technology for behaviour change},
address = {London, UK},
abstract = {Background
The Internet of Things (IoT) will revolutionise digital health by enhancing users' ability to manage their wellbeing, fitness and health through wearable technology that can provide real time, tailored feedback. These devices can provide valuable data that can enhance diagnosis, patient monitoring and interaction between patients and health care professionals. However, along with the potential benefits, there are unaddressed concerns around the security and privacy of sensitive health information stored on IoT devices, and around the physical safety of users of these devices. In conventional computing it is well established how users can protect themselves against cyber-threats. In the context of IoT however, there is a lack of understanding of key protective behaviours users can perform to protect their security, privacy and safety. This study aimed to establish expert consensus concerning the 1) key malicious IoT threats, 2) key protective behaviours for users to safeguard themselves in IoT environments, and 3) key problematic user behaviours that may undermine cyber hygiene in IoT environments.
Method The study adopted a multi-phase Delphi design with a panel of information security/IoT experts across three phases. In phase one experts answered open-ended questions relating to IoT threats, protective and risky user behaviours. Responses were coded into broad hygiene categories using content analysis by two researchers. The average inter-rater reliability was k= .70. In phases two and three, experts rated each identified behaviour on their importance, ease of implementation and how time consuming the behaviour is to perform, using 7 point Likert scales ranging from strongly disagree to strongly agree. They also assessed the likelihood of threats and problematic behaviours leading to a successful breach using a scale from 0-100. In phase three participants were also able to re-evaluate their original responses in light of panel scores.
Results
Findings indicated that users need to engage in protective actions across IoT lifecycles from purchase, set-up and maintenance, to device disposal. We found that the top three hygiene categories most discussed by our panel were: credential management behaviours (e.g. use strong passwords), privacy-protective actions (e.g. limit sharing of personal information) and network security (e.g. isolating IoT devices onto their own network). Problematic behaviours included not engaging in protective actions, circumventing security protocols and doing risky actions that leave users vulnerable to attack. For threats, conventional attacks (such as social engineering and denial of service) attacks were considered to continue to be prevalent in IoT, as well as, newer focus of attack vectors (such as counterfeit IoT devices) that comprise security, privacy and safety.
Conclusion
There was consensus on the need to consider behaviours across IoT lifecycles. By considering behaviour across each lifecycle, we have been able to identify key behaviours that users need to adopt when using IoT healthcare devices. Furthermore, we have been able to identify key threats that can, for example, put users' sensitive health information at risk and problematic behaviours that may lead users to be at risk of a successful attack.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
The Internet of Things (IoT) will revolutionise digital health by enhancing users' ability to manage their wellbeing, fitness and health through wearable technology that can provide real time, tailored feedback. These devices can provide valuable data that can enhance diagnosis, patient monitoring and interaction between patients and health care professionals. However, along with the potential benefits, there are unaddressed concerns around the security and privacy of sensitive health information stored on IoT devices, and around the physical safety of users of these devices. In conventional computing it is well established how users can protect themselves against cyber-threats. In the context of IoT however, there is a lack of understanding of key protective behaviours users can perform to protect their security, privacy and safety. This study aimed to establish expert consensus concerning the 1) key malicious IoT threats, 2) key protective behaviours for users to safeguard themselves in IoT environments, and 3) key problematic user behaviours that may undermine cyber hygiene in IoT environments.
Method The study adopted a multi-phase Delphi design with a panel of information security/IoT experts across three phases. In phase one experts answered open-ended questions relating to IoT threats, protective and risky user behaviours. Responses were coded into broad hygiene categories using content analysis by two researchers. The average inter-rater reliability was k= .70. In phases two and three, experts rated each identified behaviour on their importance, ease of implementation and how time consuming the behaviour is to perform, using 7 point Likert scales ranging from strongly disagree to strongly agree. They also assessed the likelihood of threats and problematic behaviours leading to a successful breach using a scale from 0-100. In phase three participants were also able to re-evaluate their original responses in light of panel scores.
Results
Findings indicated that users need to engage in protective actions across IoT lifecycles from purchase, set-up and maintenance, to device disposal. We found that the top three hygiene categories most discussed by our panel were: credential management behaviours (e.g. use strong passwords), privacy-protective actions (e.g. limit sharing of personal information) and network security (e.g. isolating IoT devices onto their own network). Problematic behaviours included not engaging in protective actions, circumventing security protocols and doing risky actions that leave users vulnerable to attack. For threats, conventional attacks (such as social engineering and denial of service) attacks were considered to continue to be prevalent in IoT, as well as, newer focus of attack vectors (such as counterfeit IoT devices) that comprise security, privacy and safety.
Conclusion
There was consensus on the need to consider behaviours across IoT lifecycles. By considering behaviour across each lifecycle, we have been able to identify key behaviours that users need to adopt when using IoT healthcare devices. Furthermore, we have been able to identify key threats that can, for example, put users' sensitive health information at risk and problematic behaviours that may lead users to be at risk of a successful attack.310. Speed, Chris; Oberlander, Jon: Centre for design informatics. In: vol. 24, no. 2, pp. 18–21, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-speed_centre_2017,
title = {Centre for design informatics},
author = {Chris Speed and Jon Oberlander},
url = {https://doi.org/10.1145%2F3047400},
doi = {10.1145/3047400},
year = {2017},
date = {2017-02-21},
volume = {24},
number = {2},
pages = {18--21},
publisher = {Association for Computing Machinery (ACM)},
abstract = {The Centre for Design Informatics provides a platform in which design and data science can mix. As a team, we are interested in the emerging field of human-data interactions and developing ways for design to engage with the complexity of digital economic systems. Through a combination of methods from both the humanities and sciences, the lab offers design-centered solutions for cultural, commercial, and civic sectors, often resulting in new forms of visualizing, experiencing, and interpreting data. The strategic view of Design Informatics is to provide methodologies and solutions that allow organizations to better understand the value of their data in ways that are commensurate with the values of the stakeholders within each network.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
311. Mittelstadt, Brent Daniel: From Individual to Group Privacy in Big Data Analytics. In: vol. 30, no. 4, pp. 475–494, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-mittelstadt_individual_2017,
title = {From Individual to Group Privacy in Big Data Analytics},
author = {Brent Daniel Mittelstadt},
url = {https://doi.org/10.1007%2Fs13347-017-0253-7},
doi = {10.1007/s13347-017-0253-7},
year = {2017},
date = {2017-02-11},
volume = {30},
number = {4},
pages = {475--494},
publisher = {Springer Science and Business Media LLC},
abstract = {Mature information societies are characterised by mass production of data that provide insight into human behaviour. Analytics (as in big data analytics) has arisen as a practice to make sense of the data trails generated through interactions with networked devices, platforms and organisations. Persistent knowledge describing the behaviours and characteristics of people can be constructed over time, linking individuals into groups or classes of interest to the platform. Analytics allows for a new type of algorithmically assembled group to be formed that does not necessarily align with classes or attributes already protected by privacy and anti-discrimination law or addressed in fairness- and discrimination-aware analytics. Individuals are linked according to offline identifiers (e.g. age, ethnicity, geographical location) and shared behavioural identity tokens, allowing for predictions and decisions to be taken at a group rather than individual level. This article examines the ethical significance of such ad hoc groups in analytics and argues that the privacy interests of algorithmically assembled groups in inviolate personality must be recognised alongside individual privacy rights. Algorithmically grouped individuals have a collective interest in the creation of information about the group, and actions taken on its behalf. Group privacy is proposed as a third interest to balance alongside individual privacy and social, commercial and epistemic benefits when assessing the ethical acceptability of analytics platforms.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
312. D'Iddio, Andrea Callia; Huth, Michael: Manyopt: An Extensible Tool for Mixed, Non-Linear Optimization Through SMT Solving. In: arxiv:1702.01332, 2017. (Type: Journal Article | Abstract | Links | BibTeX) @article{art-diddio_manyopt_2017,
title = {Manyopt: An Extensible Tool for Mixed, Non-Linear Optimization Through SMT Solving},
author = {Andrea Callia D'Iddio and Michael Huth},
url = {http://arxiv.org/abs/1702.01332v1},
year = {2017},
date = {2017-02-04},
journal = {arxiv:1702.01332},
abstract = {Optimization of Mixed-Integer Non-Linear Programming (MINLP) supports important decisions in applications such as Chemical Process Engineering. But current solvers have limited ability for deductive reasoning or the use of domain-specific theories, and the management of integrality constraints does not yet exploit automated reasoning tools such as SMT solvers. This seems to limit both scalability and reach of such tools in practice. We therefore present a tool, ManyOpt, for MINLP optimization that enables experimentation with reduction techniques which transform a MINLP problem to feasibility checking realized by an SMT solver. ManyOpt is similar to the SAT solver ManySAT in that it runs a specified number of such reduction techniques in parallel to get the strongest result on a given MINLP problem. The tool is implemented in layers, which we may see as features and where reduction techniques are feature vectors. Some of these features are inspired by known MINLP techniques whereas others are novel and specific to SMT. Our experimental results on standard benchmarks demonstrate the benefits of this approach. The tool supports a variety of SMT solvers and is easily extensible with new features, courtesy of its layered structure. For example, logical formulas for deductive reasoning are easily added to constrain further the optimization of a MINLP problem of interest.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
313. Maxwell, Deborah; Speed, Chris; Pschetz, Larissa: Story Blocks: Reimagining Narrative Through the Blockchain. In: vol. 23, no. 1, pp. 79–97, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-maxwell_story_2017,
title = {Story Blocks: Reimagining Narrative Through the Blockchain},
author = {Deborah Maxwell and Chris Speed and Larissa Pschetz},
url = {https://doi.org/10.1177%2F1354856516675263},
doi = {10.1177/1354856516675263},
year = {2017},
date = {2017-01-24},
volume = {23},
number = {1},
pages = {79--97},
publisher = {SAGE Publications},
abstract = {Digital technology is changing, and has changed the ways we create and consume narratives, from moving images and immersive storyworlds to digital long-form and multi-branched story experiences. At the same time, blockchain, the technology that underpins cryptocurrencies such as Bitcoin, is revolutionizing the way that transactions and exchanges occur. As a globally stored and collaboratively written list of all transactions that have ever taken place within a given system, the blockchain decentralizes money and offers a platform for its creative use. There are already examples of blockchain technologies extending beyond the realm of currency, including the decentralization of domain name servers that are not subject to government takedown and identity management and governance. By framing key blockchain concepts with past and present storytelling practices, this article raises questions as to how the principles and implementation of such distributed ledger technologies might be used within contemporary writing practices - that is, can we imagine stories as a currency or value system? We present three experiments that draw on some of the fundamental principles of blockchain and Bitcoin, as an instantiation of a blockchain implemented application, namely, (1) the ledger, (2) the blocks and (3) the mining process. Each low-fi experiment was intentionally designed to be very accessible to take part in and understand and all were conducted as discrete workshops with different sets of participants. Participants included a cohort of design students, technology industry and design professionals and writing and interaction design academics. Each experiment raised a different set of reflections and subsequent questions on the nature of digital, the linearity (or not) of narratives and collaborative processes.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
314. Ahlfeldt, Gabriel; Koutroumpis, Pantelis; Valletti, Tommaso: Speed 2.0: Evaluating Access to Universal Digital Highways. In: vol. 15, no. 3, pp. 586–625, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-ahlfeldt_speed_2017,
title = {Speed 2.0: Evaluating Access to Universal Digital Highways},
author = {Gabriel Ahlfeldt and Pantelis Koutroumpis and Tommaso Valletti},
url = {https://doi.org/10.1093%2Fjeea%2Fjvw013},
doi = {10.1093/jeea/jvw013},
year = {2017},
date = {2017-01-09},
volume = {15},
number = {3},
pages = {586--625},
publisher = {Oxford University Press (OUP)},
abstract = {This paper shows that having access to a fast Internet connection is an important determinant of capitalization effects in property markets. Our empirical strategy combines a boundary discontinuity design with controls for time-invariant effects and arbitrary macroeconomic shocks at a very local level to identify the causal effect of broadband speed on property prices from variation that is plausibly exogenous. Applying this strategy to a micro data set from England between 1995 and 2010 we find a significantly positive effect, but diminishing returns to speed. Our results imply that disconnecting an average property from a high-speed first-generation broadband connection (offering Internet speed up to 8 Mbit/s) would depreciate its value by 2.8%. In contrast, upgrading such a property to a faster connection (offering speeds up to 24 Mbit/s) would increase its value by no more than 1%. We decompose this effect by income and urbanization, finding considerable heterogeneity. These estimates are used to evaluate proposed plans to deliver fast broadband universally. We find that increasing speed and connecting unserved households pass a cost-benefit test in urban and some suburban areas, whereas the case for universal delivery in rural areas is not as strong. (JEL: L1, H4, R2)},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
315. Coulton, Paul; Lindley, Joseph Galen: Design Fiction: Anticipating Adoption. In: vol. 16, no. 1, pp. 43–47, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-coulton_design_2017,
title = {Design Fiction: Anticipating Adoption},
author = {Paul Coulton and Joseph Galen Lindley},
url = {https://doi.org/10.1109%2Fmprv.2017.5},
doi = {10.1109/mprv.2017.5},
year = {2017},
date = {2017-01-05},
volume = {16},
number = {1},
pages = {43--47},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {This tutorial highlights the potential of design fiction with Game of Drones, a fictional user trial of an imagined Drone Enforcement System. The authors explore a potential future use of drones for civic enforcement activities and advance a program for developing design fiction as a research method. This method provides a means for exploring the societal, technological, and political nuances of possible futures so researchers can better consider possible adoption pathways for emerging technologies. This tutorial is part of a special issue on drones.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
316. Li, Tianrun; Heinis, Thomas; Luk, Wayne: ADvaNCE – Efficient and Scalable Approximate Density-Based Clustering Based on Hashing. In: vol. 28, no. 1, pp. 105–130, 2017. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-li_advance_2017,
title = {ADvaNCE \textendash Efficient and Scalable Approximate Density-Based Clustering Based on Hashing},
author = {Tianrun Li and Thomas Heinis and Wayne Luk},
url = {https://doi.org/10.15388%2Finformatica.2017.122},
doi = {10.15388/informatica.2017.122},
year = {2017},
date = {2017-01-01},
volume = {28},
number = {1},
pages = {105--130},
publisher = {Vilnius University Press},
abstract = {Analysing massive amounts of data and extracting value from it has become key across different disciplines. As the amounts of data grow rapidly, current approaches for data analysis are no longer efficient. This is particularly true for clustering algorithms where distance calculations between pairs of points dominate overall time: the more data points are in the dataset, the bigger the share of time needed for distance calculations.
Crucial to the data analysis and clustering process, however, is that it is rarely straightforward: instead, parameters need to be determined and tuned first. Entirely accurate results are thus rarely needed and instead we can sacrifice little precision of the final result to accelerate the computation. In this paper we develop ADvaNCE, a new approach based on approximating DBSCAN. More specifically, we propose two measures to reduce distance calculation overhead and to consequently approximate DBSCAN: (1) locality sensitive hashing to approximate and speed up distance calculations and (2) representative point selection to reduce the number of distance calculations.
The experiments show that the resulting clustering algorithm is more scalable than the state-of-the-art as the datasets become bigger. Compared with the most recent approximation technique for DBSCAN, our approach is in general one order of magnitude faster (at most 30× in our experiments) as the size of the datasets increase.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Crucial to the data analysis and clustering process, however, is that it is rarely straightforward: instead, parameters need to be determined and tuned first. Entirely accurate results are thus rarely needed and instead we can sacrifice little precision of the final result to accelerate the computation. In this paper we develop ADvaNCE, a new approach based on approximating DBSCAN. More specifically, we propose two measures to reduce distance calculation overhead and to consequently approximate DBSCAN: (1) locality sensitive hashing to approximate and speed up distance calculations and (2) representative point selection to reduce the number of distance calculations.
The experiments show that the resulting clustering algorithm is more scalable than the state-of-the-art as the datasets become bigger. Compared with the most recent approximation technique for DBSCAN, our approach is in general one order of magnitude faster (at most 30× in our experiments) as the size of the datasets increase.317. Ah-Fat, Patrick; Huth, Michael: Secure Multi-party Computation: Information Flow of Outputs and Game Theory. In: Principles of Security and Trust, pp. 71–92, Springer Berlin Heidelberg, 2017. (Type: Book Section | Abstract | Links | BibTeX | Altmetric) @incollection{col-in-ah-fat_secure_2017,
title = {Secure Multi-party Computation: Information Flow of Outputs and Game Theory},
author = {Patrick Ah-Fat and Michael Huth},
url = {https://doi.org/10.1007%2F978-3-662-54455-6_4},
doi = {10.1007/978-3-662-54455-6_4},
year = {2017},
date = {2017-01-01},
booktitle = {Principles of Security and Trust},
pages = {71--92},
publisher = {Springer Berlin Heidelberg},
abstract = {Secure multiparty computation enables protocol participants to compute the output of a public function of their private inputs whilst protecting the confidentiality of their inputs. But such an output, as a function of its inputs, inevitably leaks some information about input values regardless of the protocol used to compute it. We introduce foundations for quantifying and understanding how such leakage may influence input behaviour of deceitful protocol participants as well as that of participants they target. Our model captures the beliefs and knowledge that participants have about what input values other participants may choose. In this model, measures of information flow that may arise between protocol participants are introduced, formally investigated, and experimentally evaluated. These information-theoretic measures not only suggest advantageous input behaviour to deceitful participants for optimal updates of their beliefs about chosen inputs of targeted participants. They also allow targets to quantify the information-flow risk of their input choices. We show that this approach supports a game-theoretic formulation in which deceitful attackers wish to maximise the information that they gain on inputs of targets once the computation output is known, whereas the targets wish to protect the privacy of their inputs.},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
318. Huth, Michael; Vishik, Claire; Masucci, Riccardo: From Risk Management to Risk Engineering. In: Handbook of System Safety and Security, pp. 131–174, Elsevier, 2017. (Type: Book Section | Abstract | Links | BibTeX | Altmetric) @incollection{col-in-huth_risk_2017,
title = {From Risk Management to Risk Engineering},
author = {Michael Huth and Claire Vishik and Riccardo Masucci},
url = {https://doi.org/10.1016%2Fb978-0-12-803773-7.00008-5},
doi = {10.1016/b978-0-12-803773-7.00008-5},
year = {2017},
date = {2017-01-01},
booktitle = {Handbook of System Safety and Security},
pages = {131--174},
publisher = {Elsevier},
abstract = {Information and communications technology (ICT) is an umbrella term that includes any communication device or application, encompassing: radio, television, cellular phones, computer and network hardware and software, satellite systems, and so on, as well as the various services and applications associated with them, such as videoconferencing and distance learning. Traditional and conventional approaches to the design, implementation, and validation of ICT systems typically deal with one core system concern or two system concerns at a time, for example, the functional correctness or reliability of an enterprise system, or security and privacy of a database. Additional aspects are often addressed by a separate engineering activity. This separation of concerns has led to system engineering practices that are not designed to reflect, detect, or manage the interdependencies of such aspects, for example, the interplay between security and safety in modern car electronics, or between security, privacy, and reliability in connected medical devices. Current trends and innovation in ICT, however, suggest a convergence of disciplines and risk domains in order to deal effectively and predictively with such interdependencies. But due to the inherent complexity of such interdependencies and the dynamic operational environments, identification and mitigation of composite risks in systems remains a challenge. The environment that requires risk management and mitigation be a central and integral part of engineering methods for future ICT systems. To address the requirements of the modern computing environment, we need a new approach to risk, where risk modeling is included in design as its integral part. In this chapter, we identify some of the key challenges and issues that a vision of risk engineering brings to current engineering practice; notably, issues of risk composition, the multidisciplinary nature of risk, the design, development, and use of risk metrics, and the need for an extensible risk language. The chapter provides an initial view on the foundational mechanisms we need to build in order to support the vision of risk engineering: risk ontology, risk modeling and composition, and risk language.},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
319. Ravi, Daniele; Wong, Charence; Deligianni, Fani; Berthelot, Melissa; Andreu-Perez, Javier; Lo, Benny P. L.; Yang, Guang-Zhong: Deep Learning for Health Informatics. In: vol. 21, no. 1, pp. 4–21, 2016. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-ravi_deep_2017a,
title = {Deep Learning for Health Informatics},
author = {Daniele Ravi and Charence Wong and Fani Deligianni and Melissa Berthelot and Javier Andreu-Perez and Benny P. L. Lo and Guang-Zhong Yang},
url = {https://doi.org/10.1109%2Fjbhi.2016.2636665},
doi = {10.1109/jbhi.2016.2636665},
year = {2016},
date = {2016-12-29},
volume = {21},
number = {1},
pages = {4--21},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {With a massive influx of multimodality data, the role of data analytics in health informatics has grown rapidly in the last decade. This has also prompted increasing interests in the generation of analytical, data driven models based on machine learning in health informatics. Deep learning, a technique with its foundation in artificial neural networks, is emerging in recent years as a powerful tool for machine learning, promising to reshape the future of artificial intelligence. Rapid improvements in computational power, fast data storage, and parallelization have also contributed to the rapid uptake of the technology in addition to its predictive power and ability to generate automatically optimized high-level features and semantic interpretation from the input data. This article presents a comprehensive up-to-date review of research employing deep learning in health informatics, providing a critical analysis of the relative merit, and potential pitfalls of the technique as well as its future outlook. The paper mainly focuses on key applications of deep learning in the fields of translational bioinformatics, medical imaging, pervasive sensing, medical informatics, and public health.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
320. Floridi, Luciano: Faultless responsibility: on the nature and allocation of moral responsibility for distributed moral actions. In: vol. 374, no. 2083, pp. 20160112, 2016, ISSN: 1471-2962. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-floridi_faultless_2016,
title = {Faultless responsibility: on the nature and allocation of moral responsibility for distributed moral actions},
author = {Luciano Floridi},
editor = {Mariarosaria Taddeo and Luciano Floridi},
url = {https://doi.org/10.1098%2Frsta.2016.0112},
doi = {10.1098/rsta.2016.0112},
issn = {1471-2962},
year = {2016},
date = {2016-12-28},
volume = {374},
number = {2083},
pages = {20160112},
publisher = {The Royal Society},
series = {The ethical impact of data science},
abstract = {The concept of distributed moral responsibility (DMR) has a long history. When it is understood as being entirely reducible to the sum of (some) human, individual and already morally loaded actions, then the allocation of DMR, and hence of praise and reward or blame and punishment, may be pragmatically difficult, but not conceptually problematic. However, in distributed environments, it is increasingly possible that a network of agents, some human, some artificial (e.g. a program) and some hybrid (e.g. a group of people working as a team thanks to a software platform), may cause distributed moral actions (DMAs). These are morally good or evil (i.e. morally loaded) actions caused by local interactions that are in themselves neither good nor evil (morally neutral). In this article, I analyse DMRs that are due to DMAs, and argue in favour of the allocation, by default and overridably, of full moral responsibility (faultless responsibility) to all the nodes/agents in the network causally relevant for bringing about the DMA in question, independently of intentionality. The mechanism proposed is inspired by, and adapts, three concepts: back propagation from network theory, strict liability from jurisprudence and common knowledge from epistemic logic.
This article is part of the themed issue 'The ethical impact of data science'.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
This article is part of the themed issue 'The ethical impact of data science'.321. Taddeo, Mariarosaria: Data philanthropy and the design of the infraethics for information societies. In: vol. 374, no. 2083, pp. 20160113, 2016, ISSN: 1471-2962. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-taddeo_data_2016,
title = {Data philanthropy and the design of the infraethics for information societies},
author = {Mariarosaria Taddeo},
editor = {Mariarosaria Taddeo and Luciano Floridi},
url = {https://doi.org/10.1098%2Frsta.2016.0113},
doi = {10.1098/rsta.2016.0113},
issn = {1471-2962},
year = {2016},
date = {2016-12-28},
volume = {374},
number = {2083},
pages = {20160113},
publisher = {The Royal Society},
series = {The ethical impact of data science},
abstract = {In mature information societies, sharing data is increasingly recognized as a crucial means to foster their development. However, competing tensions on data control and ownership, limited technical understanding, and the lack of an adequate governance framework pose serious challenges to attempts to share data among different actors. Data philanthropy, understood as the donation of data from both individuals and private companies, has been proposed as means to meet these challenges. While at first sight data philanthropy may seem an uncontroversial phenomenon, a closer analysis reveals a bewildering network of problems. In this article, I analyse the role of data philanthropy in contemporary societies and the moral problems that it yields. I argue that the solution to these problems rests on the understanding of the infraethical nature of data philanthropy and on the design of an ethical framework encompassing the right infraethics and the right ethics. This is a framework able to address the changes brought about by the information revolution and to harness the opportunities that these pose for the prosperity of current and future information societies.
This article is part of the themed issue 'The ethical impact of data science'.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
This article is part of the themed issue 'The ethical impact of data science'.322. Floridi, Luciano; Taddeo, Mariarosaria: What is data ethics?. In: vol. 374, no. 2083, pp. 20160360, 2016, ISSN: 1471-2962. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-floridi_what_2016,
title = {What is data ethics?},
author = {Luciano Floridi and Mariarosaria Taddeo},
editor = {Mariarosaria Taddeo and Luciano Floridi},
url = {https://doi.org/10.1098%2Frsta.2016.0360},
doi = {10.1098/rsta.2016.0360},
issn = {1471-2962},
year = {2016},
date = {2016-12-28},
volume = {374},
number = {2083},
pages = {20160360},
publisher = {The Royal Society},
series = {The ethical impact of data science},
abstract = {This theme issue has the founding ambition of landscaping data ethics as a new branch of ethics that studies and evaluates moral problems related to data (including generation, recording, curation, processing, dissemination, sharing and use), algorithms (including artificial intelligence, artificial agents, machine learning and robots) and corresponding practices (including responsible innovation, programming, hacking and professional codes), in order to formulate and support morally good solutions (e.g. right conducts or right values). Data ethics builds on the foundation provided by computer and information ethics but, at the same time, it refines the approach endorsed so far in this research field, by shifting the level of abstraction of ethical enquiries, from being information-centric to being data-centric. This shift brings into focus the different moral dimensions of all kinds of data, even data that never translate directly into information but can be used to support actions or generate behaviours, for example. It highlights the need for ethical analyses to concentrate on the content and nature of computational operations\textemdashthe interactions among hardware, software and data\textemdashrather than on the variety of digital technologies that enable them. And it emphasizes the complexity of the ethical challenges posed by data science. Because of such complexity, data ethics should be developed from the start as a macroethics, that is, as an overall framework that avoids narrow, ad hoc approaches and addresses the ethical impact and implications of data science and its applications within a consistent, holistic and inclusive framework. Only as a macroethics will data ethics provide solutions that can maximize the value of data science for our societies, for all of us and for our environments.
This article is part of the themed issue 'The ethical impact of data science'.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
This article is part of the themed issue 'The ethical impact of data science'.323. Ravi, Daniele; Wong, Charence; Lo, Benny P. L.; Yang, Guang-Zhong: A Deep Learning Approach to on-Node Sensor Data Analytics for Mobile or Wearable Devices. In: vol. 21, no. 1, pp. 56–64, 2016. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-ravi_deep_2017,
title = {A Deep Learning Approach to on-Node Sensor Data Analytics for Mobile or Wearable Devices},
author = {Daniele Ravi and Charence Wong and Benny P. L. Lo and Guang-Zhong Yang},
url = {https://doi.org/10.1109%2Fjbhi.2016.2633287},
doi = {10.1109/jbhi.2016.2633287},
year = {2016},
date = {2016-12-23},
volume = {21},
number = {1},
pages = {56--64},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {The increasing popularity of wearable devices in recent years means that a diverse range of physiological and functional data can now be captured continuously for applications in sports, wellbeing, and healthcare. This wealth of information requires efficient methods of classification and analysis where deep learning is a promising technique for large-scale data analytics. While deep learning has been successful in implementations that utilize high-performance computing platforms, its use on low-power wearable devices is limited by resource constraints. In this paper, we propose a deep learning methodology, which combines features learned from inertial sensor data together with complementary information from a set of shallow features to enable accurate and real-time activity classification. The design of this combined method aims to overcome some of the limitations present in a typical deep learning framework where on-node computation is required. To optimize the proposed method for real-time on-node computation, spectral domain preprocessing is used before the data are passed onto the deep learning framework. The classification accuracy of our proposed deep learning approach is evaluated against state-of-the-art methods using both laboratory and real world activity datasets. Our results show the validity of the approach on different human activity datasets, outperforming other methods, including the two methods used within our combined pipeline. We also demonstrate that the computation times for the proposed method are consistent with the constraints of real-time on-node processing on smartphones and a wearable sensor platform.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
324. Watson, Jeremy Daniel McKendrick; Lupu, Emil C.: PETRAS: Cyber Security Of The Internet Of Things. In: 2016. (Type: Journal Article | Abstract | Links | BibTeX) @article{art-watson_petras_2016,
title = {PETRAS: Cyber Security Of The Internet Of Things},
author = {Jeremy Daniel McKendrick Watson and Emil C. Lupu},
url = {https://crestresearch.ac.uk/comment/petras-cyber-security-of-the-internet-of-things/},
year = {2016},
date = {2016-12-20},
abstract = {PETRAS is a research hub to fill knowledge gaps and promote safe and secure use of the Internet of Things.
At the beginning of 2016, the PETRAS Hub consortium of nine leading UK universities was awarded £9.8m by the Engineering and Physical Science Research Council (EPSRC). PETRAS brings the universities together with around 50 user partners representing both the private and public sectors.
Strategic review of IoT
Following a strategic review by the UK Government, 'The Internet of Things: making the most of the Second Digital Revolution' was published in 2014. It emphasised the economic importance of the Internet of Things (IoT), which would only be realised by ensuring its cybersecurity and trustworthiness while not standing in the way of vibrant technical and business development. The government response was to create the £40m IoTUK initiative, which funds the PETRAS hub amongst other initiatives.
Principles of the PETRAS hub
The review highlighted a knowledge and capability gap in the ability to look at IoT (or indeed other) cybersecurity from an integrated socio-technical viewpoint. Collaborative thinking across social and physical science disciplines was needed from project identification to execution. This principle has guided the vision for PETRAS.
PETRAS stands for Privacy, Ethics, Trust, Reliability, Acceptability and Security - headings that have relevance to both technical and social science. They are all important in ensuring the successful adoption of the Internet of Things. The PETRAS hub is founded on these six themes and emphasises in equal measure, the physical and social science aspects of the adoption of new IoT technology. The academic partners are made up of a cross-disciplinary Hub team of UCL, Imperial College, Oxford, Leicester and Warwick, augmented by four Spoke contributors at Surrey, Southampton, Cardiff and Edinburgh, who provide specialist contributions. Additionally, PETRAS boasts a large cohort of user and research partners in the private sector (ranging across banking, through healthcare to mobile telecommunications), the public and NGO sectors. 'Impact Champions' working in the PETRAS management team ensure good bidirectional connections between these and the academic partners.
Planned projects
In order to best represent and investigate the opportunities and challenges of the wide span of IoT applications, the partners have created a project structure which feeds into the generic themes of interest; Privacy \& Trust, Safety \& Security, Harnessing Economic Value, Standards, Governance \& Public Policy, and Adoption \& Acceptability. A number of projects will provide evidence under these headings; these we have grouped by type or sector into areas of applications or 'Constellations'. Around 20 initial projects cover the constellation themes. PETRAS has been designed so that further internal calls for projects can be shaped to fill the research gaps identified with user partners and then consolidate the research outcomes into concrete demonstrators. PETRAS plans to become the go-to place for research in cybersecurity of the IoT in the UK by creating an inclusive technical and social platform for innovation that will continue beyond the end of the funded period.
Examples of projects within these constellations include:
Transport \& Mobility where projects will include smart street planning, pricing and road maintenance, and security and privacy solutions for communicating autonomous and semi-autonomous cars and infrastructures.
The Health \& Care constellation will include modelling and analysis for body sensor networks, security mechanisms for miniaturised low power chips, and an investigation of the factors of user trust in medical applications of IoT.
Design \& Behaviour explores the role Design plays in influencing the adoption of IoT. In particular, how Design and Engineering can actively encourage or discourage behaviours so that Privacy and Trust are enhanced and adoption is promoted.
Projects under the Infrastructure heading look, from a policy angle, at approaches in various countries and across borders to manage IoT threats and increased attack surfaces. These projects include tools to analyse threats in many contexts.
Identification constellation projects deal with the trustworthiness of identification systems and evaluating identification technologies, protocols, and procedures alongside privacy strategies, to identify robust solutions that deliver a balance between identifiability and privacy of IoT technology.
Supply \& Control Systems projects cover secure IoT-augmented control systems for industry and buildings and explore the economic value of IoT data in cyber-physical supply chains.
The Ambient Environments constellation investigates the impact of security on adaptability within cross-layered network-wide protocols for low powered IoT devices. A combination of 'In the Wild' experiments on the Olympic Park and focus groups will explore the boundaries of privacy, trust and personalisation.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
At the beginning of 2016, the PETRAS Hub consortium of nine leading UK universities was awarded £9.8m by the Engineering and Physical Science Research Council (EPSRC). PETRAS brings the universities together with around 50 user partners representing both the private and public sectors.
Strategic review of IoT
Following a strategic review by the UK Government, 'The Internet of Things: making the most of the Second Digital Revolution' was published in 2014. It emphasised the economic importance of the Internet of Things (IoT), which would only be realised by ensuring its cybersecurity and trustworthiness while not standing in the way of vibrant technical and business development. The government response was to create the £40m IoTUK initiative, which funds the PETRAS hub amongst other initiatives.
Principles of the PETRAS hub
The review highlighted a knowledge and capability gap in the ability to look at IoT (or indeed other) cybersecurity from an integrated socio-technical viewpoint. Collaborative thinking across social and physical science disciplines was needed from project identification to execution. This principle has guided the vision for PETRAS.
PETRAS stands for Privacy, Ethics, Trust, Reliability, Acceptability and Security - headings that have relevance to both technical and social science. They are all important in ensuring the successful adoption of the Internet of Things. The PETRAS hub is founded on these six themes and emphasises in equal measure, the physical and social science aspects of the adoption of new IoT technology. The academic partners are made up of a cross-disciplinary Hub team of UCL, Imperial College, Oxford, Leicester and Warwick, augmented by four Spoke contributors at Surrey, Southampton, Cardiff and Edinburgh, who provide specialist contributions. Additionally, PETRAS boasts a large cohort of user and research partners in the private sector (ranging across banking, through healthcare to mobile telecommunications), the public and NGO sectors. 'Impact Champions' working in the PETRAS management team ensure good bidirectional connections between these and the academic partners.
Planned projects
In order to best represent and investigate the opportunities and challenges of the wide span of IoT applications, the partners have created a project structure which feeds into the generic themes of interest; Privacy & Trust, Safety & Security, Harnessing Economic Value, Standards, Governance & Public Policy, and Adoption & Acceptability. A number of projects will provide evidence under these headings; these we have grouped by type or sector into areas of applications or 'Constellations'. Around 20 initial projects cover the constellation themes. PETRAS has been designed so that further internal calls for projects can be shaped to fill the research gaps identified with user partners and then consolidate the research outcomes into concrete demonstrators. PETRAS plans to become the go-to place for research in cybersecurity of the IoT in the UK by creating an inclusive technical and social platform for innovation that will continue beyond the end of the funded period.
Examples of projects within these constellations include:
Transport & Mobility where projects will include smart street planning, pricing and road maintenance, and security and privacy solutions for communicating autonomous and semi-autonomous cars and infrastructures.
The Health & Care constellation will include modelling and analysis for body sensor networks, security mechanisms for miniaturised low power chips, and an investigation of the factors of user trust in medical applications of IoT.
Design & Behaviour explores the role Design plays in influencing the adoption of IoT. In particular, how Design and Engineering can actively encourage or discourage behaviours so that Privacy and Trust are enhanced and adoption is promoted.
Projects under the Infrastructure heading look, from a policy angle, at approaches in various countries and across borders to manage IoT threats and increased attack surfaces. These projects include tools to analyse threats in many contexts.
Identification constellation projects deal with the trustworthiness of identification systems and evaluating identification technologies, protocols, and procedures alongside privacy strategies, to identify robust solutions that deliver a balance between identifiability and privacy of IoT technology.
Supply & Control Systems projects cover secure IoT-augmented control systems for industry and buildings and explore the economic value of IoT data in cyber-physical supply chains.
The Ambient Environments constellation investigates the impact of security on adaptability within cross-layered network-wide protocols for low powered IoT devices. A combination of 'In the Wild' experiments on the Olympic Park and focus groups will explore the boundaries of privacy, trust and personalisation.325. Mittelstadt, Brent Daniel; Allo, Patrick; Taddeo, Mariarosaria; Wachter, Sandra; Floridi, Luciano: The ethics of algorithms: Mapping the debate. In: vol. 3, no. 2, pp. 1–21, 2016. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-mittelstadt_ethics_2016,
title = {The ethics of algorithms: Mapping the debate},
author = {Brent Daniel Mittelstadt and Patrick Allo and Mariarosaria Taddeo and Sandra Wachter and Luciano Floridi},
url = {https://doi.org/10.1177%2F2053951716679679},
doi = {10.1177/2053951716679679},
year = {2016},
date = {2016-12-01},
volume = {3},
number = {2},
pages = {1--21},
publisher = {SAGE Publications},
abstract = {In information societies, operations, decisions and choices previously left to humans are increasingly delegated to algorithms, which may advise, if not decide, about how data should be interpreted and what actions should be taken as a result. More and more often, algorithms mediate social processes, business transactions, governmental decisions, and how we perceive, understand, and interact among ourselves and with the environment. Gaps between the design and operation of algorithms and our understanding of their ethical implications can have severe consequences affecting individuals as well as groups and whole societies. This paper makes three contributions to clarify the ethical importance of algorithmic mediation. It provides a prescriptive map to organise the debate. It reviews the current discussion of ethical aspects of algorithms. And it assesses the available literature in order to identify areas requiring further work to develop the ethics of algorithms.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
326. M., John Blythe; Lefevre, Carmen: How to save the Internet of Things from cyber attacks --- with psychology. In: 2016. (Type: Journal Article | Abstract | Links | BibTeX) @article{art-johnblythe_how_2016,
title = {How to save the Internet of Things from cyber attacks --- with psychology},
author = {John Blythe M. and Carmen Lefevre},
url = {https://theconversation.com/how-to-save-the-internet-of-things-from-cyber-attacks-with-psychology-68608},
year = {2016},
date = {2016-11-14},
abstract = {Two scientists were recently able to take over the lights of an office building using a drone and some clever computer hacking. They demonstrated how ``smart'' lightbulbs connected to the internet were vulnerable to a virus that could spread from one infected light to any bulb in range. The researchers flew a drone up to the building, transmitted a signal that hacked into one light and then took control of the whole floor. In theory, such an attack could be used to take out the lights of an entire city, if smartbulbs were to become commonplace.
These bulbs are just one example of devices that can be connected to the Internet of Things (IoT). The IoT refers to any everyday object with the ability to collect to and exchange data over the internet. The technology can allow you to remotely and automatically control the heating, lighting, sound-system and other devices in your home, based on your normal routine.
But these devices are also vulnerable to cyber attacks. The lightbulb example may have been a research experiment, but in a major attack recently, hundreds of thousands of IoT devices were captured by hackers and used to bring down many popular websites. So we need to make these objects more secure. One way to do this is to use psychology to understand users' capabilities and motivations and try to change people's behaviour.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
These bulbs are just one example of devices that can be connected to the Internet of Things (IoT). The IoT refers to any everyday object with the ability to collect to and exchange data over the internet. The technology can allow you to remotely and automatically control the heating, lighting, sound-system and other devices in your home, based on your normal routine.
But these devices are also vulnerable to cyber attacks. The lightbulb example may have been a research experiment, but in a major attack recently, hundreds of thousands of IoT devices were captured by hackers and used to bring down many popular websites. So we need to make these objects more secure. One way to do this is to use psychology to understand users' capabilities and motivations and try to change people's behaviour.327. Perera, Charith; Wakenshaw, Susan Y. L.; Baarslag, Tim; Haddadi, Hamed; Bandara, Arosha K.; Mortier, Richard; Crabtree, Andy; Ng, Irene C. L.; McAuley, Derek; Crowcroft, Jon: Valorising the IoT Databox: creating value for everyone. In: vol. 28, no. 1, pp. e3125, 2016. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-perera_valorising_2016,
title = {Valorising the IoT Databox: creating value for everyone},
author = {Charith Perera and Susan Y. L. Wakenshaw and Tim Baarslag and Hamed Haddadi and Arosha K. Bandara and Richard Mortier and Andy Crabtree and Irene C. L. Ng and Derek McAuley and Jon Crowcroft},
url = {https://doi.org/10.1002%2Fett.3125},
doi = {10.1002/ett.3125},
year = {2016},
date = {2016-11-11},
volume = {28},
number = {1},
pages = {e3125},
publisher = {Wiley},
abstract = {The Internet of Things is expected to generate large amounts of heterogeneous data from diverse sources including physical sensors, user devices and social media platforms. Over the last few years, significant attention has been focused on personal data, particularly data generated by smart wearable and smart home devices. Making personal data available for access and trade is expected to become a part of the data-driven digital economy. In this position paper, we review the research challenges in building personal Databoxes that hold personal data and enable data access by other parties and potentially thus sharing of data with other parties. These Databoxes are expected to become a core part of future data marketplaces.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
328. Katsaros, Konstantinos; Dianati, Mehrdad: A Conceptual 5G Vehicular Networking Architecture. In: 5G Mobile Communications, pp. 595–623, Springer International Publishing, 2016. (Type: Book Section | Abstract | Links | BibTeX | Altmetric) @incollection{col-in-katsaros_conceptual_2016,
title = {A Conceptual 5G Vehicular Networking Architecture},
author = {Konstantinos Katsaros and Mehrdad Dianati},
url = {https://doi.org/10.1007%2F978-3-319-34208-5_22},
doi = {10.1007/978-3-319-34208-5_22},
year = {2016},
date = {2016-10-14},
booktitle = {5G Mobile Communications},
pages = {595--623},
publisher = {Springer International Publishing},
abstract = {This chapter presents a thorough investigation on current vehicular networking architectures (access technologies and overlay networks) and their (r)evolution towards the 5G era. The main driving force behind vehicular networking is to increase safety, with several other applications exploiting this ecosystem for traffic efficiency and infotainment provision. The most prominent existing candidates for vehicular networking are based on dedicated short range communications (DSRC) and cellular (4G) communications. In addition, the maturity of cloud computing has accommodated the invasion of vehicular space with cloud-based services. Nevertheless, current architectures can not meet the latency requirements of Intelligent Transport Systems (ITS) applications in highly congested and mobile environments. The future trend of autonomous driving pushes current networking architectures further to their limits with hard real-time requirements. Vehicular networks in 5G have to address five major challenges that affect current architectures: congestion, mobility management, backhaul networking, air interface and security. As networking transforms from simple connectivity provision, to service and content provision, fog computing approaches with caching and pre-fetching improve significantly the performance of the networks. The cloudification of network resources through software defined networking (SDN)/network function virtualization (NFV) principles, is another promising enabler for efficient vehicular networking in 5G. Finally, new wireless access mechanisms combined with current DSRC and 4G will enable to bring the vehicles in the cloud.},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
329. Chen, Shanshan; Lach, John; Lo, Benny P. L.; Yang, Guang-Zhong: Toward Pervasive Gait Analysis With Wearable Sensors: A Systematic Review. In: vol. 20, no. 6, pp. 1521–1537, 2016. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-chen_pervasive_2016,
title = {Toward Pervasive Gait Analysis With Wearable Sensors: A Systematic Review},
author = {Shanshan Chen and John Lach and Benny P. L. Lo and Guang-Zhong Yang},
url = {https://doi.org/10.1109%2Fjbhi.2016.2608720},
doi = {10.1109/jbhi.2016.2608720},
year = {2016},
date = {2016-09-22},
volume = {20},
number = {6},
pages = {1521--1537},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {After decades of evolution, measuring instruments for quantitative gait analysis have become an important clinical tool for assessing pathologies manifested by gait abnormalities. However, such instruments tend to be expensive and require expert operation and maintenance besides their high cost, thus limiting them to only a small number of specialized centers. Consequently, gait analysis in most clinics today still relies on observation-based assessment. Recent advances in wearable sensors, especially inertial body sensors, have opened up a promising future for gait analysis. Not only can these sensors be more easily adopted in clinical diagnosis and treatment procedures than their current counterparts, but they can also monitor gait continuously outside clinics - hence providing seamless patient analysis from clinics to free-living environments. The purpose of this paper is to provide a systematic review of current techniques for quantitative gait analysis and to propose key metrics for evaluating both existing and emerging methods for qualifying the gait features extracted from wearable sensors. It aims to highlight key advances in this rapidly evolving research field and outline potential future directions for both research and clinical applications.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
330. Zhao, Cong; Yang, Shusen; Yang, Xinyu; McCann, Julie A.: Rapid, User-Transparent, and Trustworthy Device Pairing for D2D-Enabled Mobile Crowdsourcing. In: vol. 16, no. 7, pp. 2008–2022, 2016. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-zhao_rapid_2017,
title = {Rapid, User-Transparent, and Trustworthy Device Pairing for D2D-Enabled Mobile Crowdsourcing},
author = {Cong Zhao and Shusen Yang and Xinyu Yang and Julie A. McCann},
url = {https://doi.org/10.1109%2Ftmc.2016.2611575},
doi = {10.1109/tmc.2016.2611575},
year = {2016},
date = {2016-09-20},
volume = {16},
number = {7},
pages = {2008--2022},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {Mobile Crowdsourcing is a promising service paradigm utilizing ubiquitous mobile devices to facilitate large-scale crowdsourcing tasks (e.g., urban sensing and collaborative computing). Many applications in this domain require Device-to-Device (D2D) communications between participating devices for interactive operations such as task collaborations and file transmissions. Considering the private participating devices and their opportunistic encountering behaviors, it is highly desired to establish secure and trustworthy D2D connections in a fast and autonomous way, which is vital for implementing practical Mobile Crowdsourcing Systems (MCSs). In this paper, we develop an efficient scheme, Trustworthy Device Pairing (TDP), which achieves user-transparent secure D2D connections and reliable peer device selections for trustworthy D2D communications. Through rigorous analysis, we demonstrate the effectiveness and security intensity of TDP in theory. The performance of TDP is evaluated based on both real-world prototype experiments and extensive trace-driven simulations. Evaluation results verify our theoretical analysis and show that TDP significantly outperforms existing approaches in terms of pairing speed, stability, and security.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
331. Li, Tianrun; Heinis, Thomas; Luk, Wayne: Hashing-Based Approximate DBSCAN. In: ADBIS 2016: Advances in Databases and Information Systems, pp. 31–45, Springer International Publishing, 2016. (Type: Book Section | Abstract | Links | BibTeX | Altmetric) @incollection{col-in-li_hashing_2016,
title = {Hashing-Based Approximate DBSCAN},
author = {Tianrun Li and Thomas Heinis and Wayne Luk},
url = {https://doi.org/10.1007%2F978-3-319-44039-2_3},
doi = {10.1007/978-3-319-44039-2_3},
year = {2016},
date = {2016-08-14},
booktitle = {ADBIS 2016: Advances in Databases and Information Systems},
pages = {31--45},
publisher = {Springer International Publishing},
abstract = {Analyzing massive amounts of data and extracting value from it has become key across different disciplines. As the amounts of data grow rapidly, however, current approaches for data analysis struggle. This is particularly true for clustering algorithms where distance calculations between pairs of points dominate overall time.
Crucial to the data analysis and clustering process, however, is that it is rarely straightforward. Instead, parameters need to be determined through several iterations. Entirely accurate results are thus rarely needed and instead we can sacrifice precision of the final result to accelerate the computation. In this paper we develop ADvaNCE, a new approach to approximating DBSCAN. ADvaNCE uses two measures to reduce distance calculation overhead: (1) locality sensitive hashing to approximate and speed up distance calculations and (2) representative point selection to reduce the number of distance calculations. Our experiments show that our approach is in general one order of magnitude faster (at most 30x in our experiments) than the state of the art.},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
Crucial to the data analysis and clustering process, however, is that it is rarely straightforward. Instead, parameters need to be determined through several iterations. Entirely accurate results are thus rarely needed and instead we can sacrifice precision of the final result to accelerate the computation. In this paper we develop ADvaNCE, a new approach to approximating DBSCAN. ADvaNCE uses two measures to reduce distance calculation overhead: (1) locality sensitive hashing to approximate and speed up distance calculations and (2) representative point selection to reduce the number of distance calculations. Our experiments show that our approach is in general one order of magnitude faster (at most 30x in our experiments) than the state of the art.332. Jhumka, Arshad; Mottola, Luca: Neighborhood View Consistency in Wireless Sensor Networks. In: vol. 12, no. 3, pp. 1–41, 2016. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-jhumka_neighborhood_2016,
title = {Neighborhood View Consistency in Wireless Sensor Networks},
author = {Arshad Jhumka and Luca Mottola},
url = {https://doi.org/10.1145%2F2901296},
doi = {10.1145/2901296},
year = {2016},
date = {2016-07-26},
volume = {12},
number = {3},
pages = {1--41},
publisher = {Association for Computing Machinery (ACM)},
abstract = {Wireless sensor networks (WSNs) are characterized by localized interactions, that is, protocols are often based on message exchanges within a node's direct radio range. We recognize that for these protocols to work effectively, nodes must have consistent information about their shared neighborhoods. Different types of faults, however, can affect this information, severely impacting a protocol's performance. We factor this problem out of existing WSN protocols and argue that a notion of neighborhood view consistency (NVC) can be embedded within existing designs to improve their performance. To this end, we study the problem from both a theoretical and a system perspective. We prove that the problem cannot be solved in an asynchronous system using any of Chandra and Toueg's failure detectors. Because of this, we introduce a new software device called pseudocrash failure detector (PCD), study its properties, and identify necessary and sufficient conditions for solving NVC with PCDs. We prove that, in the presence of transient faults, NVC is impossible to solve with any PCDs, thus define two weaker specifications of the problem. We develop a global algorithm that satisfies both specifications in the presence of unidirectional links, and a localized algorithm that solves the weakest specification in networks of bidirectional links. We implement the latter atop two different WSN operating systems, integrate our implementations with four different WSN protocols, and run extensive micro-benchmarks and full-stack experiments on a real 90-node WSN testbed. Our results show that the performance significantly improves for NVC-equipped protocols; for example, the Collection Tree Protocol (CTP) halves energy consumption with higher data delivery.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
333. He, Hongmei; Maple, Carsten; Watson, Tim; Tiwari, Ashutosh; Mehnen, Jörn; Jin, Yaochu; Gabrys, Bogdan: The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence. In: 2016 IEEE Congress on Evolutionary Computation (CEC), IEEE, 2016. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-he_security_2016,
title = {The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing \& other computational intelligence},
author = {Hongmei He and Carsten Maple and Tim Watson and Ashutosh Tiwari and J\"{o}rn Mehnen and Yaochu Jin and Bogdan Gabrys},
url = {https://doi.org/10.1109%2Fcec.2016.7743900},
doi = {10.1109/cec.2016.7743900},
year = {2016},
date = {2016-07-24},
booktitle = {2016 IEEE Congress on Evolutionary Computation (CEC)},
publisher = {IEEE},
abstract = {Internet of Things (IoT) has given rise to the fourth industrial revolution (Industrie 4.0), and it brings great benefits by connecting people, processes and data. However, cybersecurity has become a critical challenge in the IoT enabled cyber physical systems, from connected supply chain, Big Data produced by huge amount of IoT devices, to industry control systems. Evolutionary computation combining with other computational intelligence will play an important role for cybersecurity, such as artificial immune mechanism for IoT security architecture, data mining/fusion in IoT enabled cyber physical systems, and data driven cybersecurity. This paper provides an overview of security challenges in IoT enabled cyber-physical systems and what evolutionary computation and other computational intelligence technology could contribute for the challenges. The overview could provide clues and guidance for research in IoT security with computational intelligence.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
334. Pavlovic, Mirjana; Zacharatou, Eleni Tzirita; Šidlauskas, Darius; Heinis, Thomas; Ailamaki, Anastasia: Space odyssey: efficient exploration of scientific data. In: ExploreDB '16: Proceedings of the Third International Workshop on Exploratory Search in Databases and the Web, ACM, 2016. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-pavlovic_space_2016,
title = {Space odyssey: efficient exploration of scientific data},
author = {Mirjana Pavlovic and Eleni Tzirita Zacharatou and Darius \v{S}idlauskas and Thomas Heinis and Anastasia Ailamaki},
url = {https://doi.org/10.1145%2F2948674.2948677},
doi = {10.1145/2948674.2948677},
year = {2016},
date = {2016-06-26},
booktitle = {ExploreDB '16: Proceedings of the Third International Workshop on Exploratory Search in Databases and the Web},
publisher = {ACM},
abstract = {Advances in data acquisition---through more powerful supercomputers for simulation or sensors with better resolution---help scientists tremendously to understand natural phenomena. At the same time, however, it leaves them with a plethora of data and the challenge of analysing it. Ingesting all the data in a database or indexing it for an efficient analysis is unlikely to pay off because scientists rarely need to analyse all data. Not knowing a priori what parts of the datasets need to be analysed makes the problem challenging.
Tools and methods to analyse only subsets of this data are rather rare. In this paper we therefore present Space Odyssey, a novel approach enabling scientists to efficiently explore multiple spatial datasets of massive size. Without any prior information, Space Odyssey incrementally indexes the datasets and optimizes the access to datasets frequently queried together. As our experiments show, through incrementally indexing and changing the data layout on disk, Space Odyssey accelerates exploratory analysis of spatial data by substantially reducing query-to-insight time compared to the state of the art.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
Tools and methods to analyse only subsets of this data are rather rare. In this paper we therefore present Space Odyssey, a novel approach enabling scientists to efficiently explore multiple spatial datasets of massive size. Without any prior information, Space Odyssey incrementally indexes the datasets and optimizes the access to datasets frequently queried together. As our experiments show, through incrementally indexing and changing the data layout on disk, Space Odyssey accelerates exploratory analysis of spatial data by substantially reducing query-to-insight time compared to the state of the art.335. Rosa, Bruno M. G.; Yang, Guang-Zhong: Active implantable sensor powered by ultrasounds with application in the monitoring of physiological parameters for soft tissues. In: 2016 IEEE 13th International Conference on Wearable and Implantable Body Sensor Networks (BSN), IEEE, 2016. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-rosa_active_2016,
title = {Active implantable sensor powered by ultrasounds with application in the monitoring of physiological parameters for soft tissues},
author = {Bruno M. G. Rosa and Guang-Zhong Yang},
url = {https://doi.org/10.1109%2Fbsn.2016.7516281},
doi = {10.1109/bsn.2016.7516281},
year = {2016},
date = {2016-06-14},
booktitle = {2016 IEEE 13th International Conference on Wearable and Implantable Body Sensor Networks (BSN)},
publisher = {IEEE},
abstract = {Ultrasound imaging is a proven diagnostic tool to assess a myriad of physiological and pathological conditions in patients. Throughout the years, ultrasounds have been used as a passive recording modality where the backscattered echo arising from the interaction of the sound waves with the acoustic properties of the biological tissues helps to identify them. Apart from a wide range of therapeutic applications, the acoustic beam has not yet been explored to actuate within the biological environment in an active way. In this paper we present an implantable electronic device to be actuated remotely by ultrasounds with capabilities for measuring several physiological parameters of tissues: pH, temperature, electrolyte concentration and biopotentials. The small factory form device (with no attached batteries) harvests energy from the incoming ultrasound waves and uses it to power the embedded electronics. It operates from voltage levels as low as 0.8 V and consuming a total current of 60 μA (or an average power consumption of 84 μW) in the active mode when deployed at a distance of 3 cm from the active source of ultrasounds in vitro, excited by a sinusoid at 400 kHz with power density of 20 mWcm -2 . The sensor can be actuated by a specifically-designed readout device (as detailed in this paper) or using the traditional medical probes for ultrasound imaging. The actual device can present an alternative to surpass the limitations of inductive and RF-powered sensors implanted in soft tissues.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
336. Pavlovic, Mirjana; Heinis, Thomas; Tauheed, Farhan; Karras, Panagiotis; Ailamaki, Anastasia: TRANSFORMERS: Robust spatial joins on non-uniform data distributions. In: 2016 IEEE 32nd International Conference on Data Engineering (ICDE), IEEE, 2016. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-pavlovic_transformers_2016,
title = {TRANSFORMERS: Robust spatial joins on non-uniform data distributions},
author = {Mirjana Pavlovic and Thomas Heinis and Farhan Tauheed and Panagiotis Karras and Anastasia Ailamaki},
url = {https://doi.org/10.1109%2Ficde.2016.7498280},
doi = {10.1109/icde.2016.7498280},
year = {2016},
date = {2016-05-16},
booktitle = {2016 IEEE 32nd International Conference on Data Engineering (ICDE)},
publisher = {IEEE},
abstract = {Spatial joins are becoming increasingly ubiquitous in many applications, particularly in the scientific domain. While several approaches have been proposed for joining spatial datasets, each of them has a strength for a particular type of density ratio among the joined datasets. More generally, no single proposed method can efficiently join two spatial datasets in a robust manner with respect to their data distributions. Some approaches do well for datasets with contrasting densities while others do better with similar densities. None of them does well when the datasets have locally divergent data distributions. In this paper we develop TRANSFORMERS, an efficient and robust spatial join approach that is indifferent to such variations of distribution among the joined data. TRANSFORMERS achieves this feat by departing from the state-of-the-art through adapting the join strategy and data layout to local density variations among the joined data. It employs a join method based on data-oriented partitioning when joining areas of substantially different local densities, whereas it uses big partitions (as in space-oriented partitioning) when the densities are similar, while seamlessly switching among these two strategies at runtime. We experimentally demonstrate that TRANSFORMERS outperforms state-of-the-art approaches by a factor of between 2 and 8.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
337. Lo, Benny P. L.; Ip, Henry; Yang, Guang-Zhong: Transforming Health Care: Body Sensor Networks, Wearables, and the Internet of Things. In: vol. 7, no. 1, pp. 4–8, 2016. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-lo_transforming_2016,
title = {Transforming Health Care: Body Sensor Networks, Wearables, and the Internet of Things},
author = {Benny P. L. Lo and Henry Ip and Guang-Zhong Yang},
url = {https://doi.org/10.1109%2Fmpul.2015.2498474},
doi = {10.1109/mpul.2015.2498474},
year = {2016},
date = {2016-01-20},
volume = {7},
number = {1},
pages = {4--8},
publisher = {Institute of Electrical and Electronics Engineers (IEEE)},
abstract = {This paper talks about body sensor networks, wearables, and the Internet of Things.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
338. Vishik, Claire; Balduccini, Marcello: Making Sense of Future Cybersecurity Technologies: Using Ontologies for Multidisciplinary Domain Analysis. In: ISSE 2015, pp. 135–145, Springer Fachmedien Wiesbaden, 2015. (Type: Book Section | Abstract | Links | BibTeX | Altmetric) @incollection{col-in-vishik_making_2015,
title = {Making Sense of Future Cybersecurity Technologies: Using Ontologies for Multidisciplinary Domain Analysis},
author = {Claire Vishik and Marcello Balduccini},
url = {https://doi.org/10.1007%2F978-3-658-10934-9_12},
doi = {10.1007/978-3-658-10934-9_12},
year = {2015},
date = {2015-10-16},
booktitle = {ISSE 2015},
pages = {135--145},
publisher = {Springer Fachmedien Wiesbaden},
abstract = {Security experts have difficulties achieving quick vulnerability mitigation because cybersecurity is a complex multi-disciplinary subject that yields itself with great difficulty to traditional methods of risk analysis. In particular, the effectiveness of mitigation strategies depends on an accurate understanding of the relationships among the components of systems that need to be protected, their functional requirements, and of the trade-off between security protection and core functionality. Mitigation strategies may have undesired ripple-effects, such as unexpectedly modifying functions that other system components rely upon. If some of the side-effects of a mitigation strategy are not clearly understood by a security expert, the consequences may be costly. Thus, vulnerability mitigation requires a deep understanding of the subtle interdependencies that exist between domains that are different in nature. This is especially difficult for new technology use models, such as Cloud-based computing and IoT, in which cyber and physical components are combined and interdependent. By their own design, ontologies and the associated inference mechanisms permit us to reason about connections between diverse domains and contexts that are pertinent for the general threat picture, and to highlight the effects and ramifications of the mitigation strategies considered. In this paper, we position ontologies as crucial tools for understanding the threat space for new technology space, for increasing security experts' situational awareness, and, ultimately, as decision-support tools for rapid development of mitigation strategies. We follow with the discussion of the new information and insights gleaned from the ontology-based study of the root of trust in cyber-physical systems.},
keywords = {},
pubstate = {published},
tppubtype = {incollection}
}
339. Dianati, Mehrdad; Shen, Xeumin Sherman; Naik, Kshirasagar: Efficient scheduling for the downlink of CDMA cellular networks using base station selection diversity. In: 2nd International Conference on Broadband Networks, 2005, IEEE, 2005. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-dianati_efficient_2005,
title = {Efficient scheduling for the downlink of CDMA cellular networks using base station selection diversity},
author = {Mehrdad Dianati and Xeumin Sherman Shen and Kshirasagar Naik},
url = {https://doi.org/10.1109%2Ficbn.2005.1589640},
doi = {10.1109/icbn.2005.1589640},
year = {2005},
date = {2005-10-07},
booktitle = {2nd International Conference on Broadband Networks, 2005},
publisher = {IEEE},
abstract = {Efficient packet scheduling in CDMA cellular networks is a challenging problem due to the time variant and stochastic nature of the channel fading process. Selection diversity is one of the most effective techniques utilizing random and independent variations of diverse channels to improve the performance of communication over fading channels. Exploiting base station selection diversity, in this paper, we propose two scheduling schemes for the downlink of CDMA cellular networks. The proposed schemes rely on the limited instantaneous Channel State Information to transmit to the best user from the best serving base station in each time slot. This technique increases the system throughput by increasing multi-user diversity gain and reducing the effective interference among adjacent base stations. Results of Monte Carlo simulations are given to demonstrate the improvement of system throughput using the proposed scheduling schemes. We also investigate the issue of fairness analysis of wireless scheduling schemes. Due to the unique characteristics of wireless scheduling schemes, the existing fairness indexes fail to provide a proper comparison among different scheduling schemes. We propose a new fairness index to compare the overall satisfaction of the network users among different wireless scheduling schemes. This approach complies with the definition of max-min fairness which is a widely accepted notion of fairness for data communication networks.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
340. Dianati, Mehrdad; Shen, Xeumin Sherman; Naik, Kshirasagar: A new fairness index for radio resource allocation in wireless networks. In: IEEE Wireless Communications and Networking Conference, 2005, IEEE, 2005. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-dianati_new_2005,
title = {A new fairness index for radio resource allocation in wireless networks},
author = {Mehrdad Dianati and Xeumin Sherman Shen and Kshirasagar Naik},
url = {https://doi.org/10.1109%2Fwcnc.2005.1424595},
doi = {10.1109/wcnc.2005.1424595},
year = {2005},
date = {2005-03-13},
booktitle = {IEEE Wireless Communications and Networking Conference, 2005},
publisher = {IEEE},
abstract = {In this paper, we investigate the measurement of fairness, discuss well known fairness notions, and propose a new utility-based framework to evaluate the degree of fairness of resource allocation schemes in wireless access networks. The proposed framework has certain desirable features. It offers clear definitions and relevant methodology, takes into account both effort and service unfairness, and can be customized for different application types with different QoS requirements. Numerical examples and case studies are given to demonstrate the effectiveness of the proposed framework.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
341. Akmal, Haider Ali; Coulton, Paul: Research through Board Game Design. RTD Conference, figshare, 0000. (Type: Conference | Abstract | Links | BibTeX | Altmetric) @conference{conf-akmal_research_2019,
title = {Research through Board Game Design},
author = {Haider Ali Akmal and Paul Coulton},
doi = {10.6084/M9.FIGSHARE.7855808.V1},
booktitle = {RTD Conference},
publisher = {figshare},
abstract = {This research presents the design of a board game that explores issues related to privacy, ethics, trust, risk, acceptability, and security within the Internet of Things (IoT). In particular, it aims to assist players in developing mental models of the increasing hybrid digital/physical spaces they inhabit in which notions of public and private are increasingly blurred. The game is based on an Heterotopical Model for Inter-Spatial Interaction, inspired by Michel Foucault's essay ``Of Other Spaces'', which can act as a lens for designing IoT products and services.
In the game, players explore the spatial division between physical and virtual and are rather exposed to its procedural rhetoric, which highlights how notions of public and private are in constant flux and must be constantly renegotiated as they add or make connections with any new IoT devices they encounter. As the meaning of any game only emerges through play, it was developed through iterative play-testing in which player experience was evaluated against the intended rhetoric. This led to a number of fundamental re-designs and proved useful for evaluating the model itself. This discussion highlights that while game design research somewhat sits apart from more general design research it aligns closely with research through design.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
In the game, players explore the spatial division between physical and virtual and are rather exposed to its procedural rhetoric, which highlights how notions of public and private are in constant flux and must be constantly renegotiated as they add or make connections with any new IoT devices they encounter. As the meaning of any game only emerges through play, it was developed through iterative play-testing in which player experience was evaluated against the intended rhetoric. This led to a number of fundamental re-designs and proved useful for evaluating the model itself. This discussion highlights that while game design research somewhat sits apart from more general design research it aligns closely with research through design.342. Coulton, Paul; Lindley, Joseph Galen; Gradinar, Adrian; Colley, James; Sailaja, Neelima; Crabtree, Andy; Forrester, Ian; Kerlin, Lianne: Experiencing the Future Mundane. RTD Conference, figshare, 0000. (Type: Conference | Abstract | Links | BibTeX | Altmetric) @conference{conf-coulton_experiencing_2019,
title = {Experiencing the Future Mundane},
author = {Paul Coulton and Joseph Galen Lindley and Adrian Gradinar and James Colley and Neelima Sailaja and Andy Crabtree and Ian Forrester and Lianne Kerlin},
doi = {10.6084/M9.FIGSHARE.7855790.V1},
booktitle = {RTD Conference},
publisher = {figshare},
abstract = {Through the design, development and implementation of the Living Room of the Future (LRoTF), we build upon existing work to progress two strands of research. The first explores how media broadcasters may utilise Object-Based Media (OBM) to provide more immersive experiences. Created in conjunction with the BBC R\&D the LRofTF utilizes OBM to dynamically customise television content according to audiences' personal, contextual and derived data. OBM works by breaking media into smaller parts or `objects', describing how they relate to each other semantically, and then reassembling them into personalized programmes. In addition to this media-delivery aspect, the LRoTF explores data protection issues that arise from OBM's use of data by integrating with the privacy-enhancing Databox system. The second research focus develops understandings of Design Fiction. While the `World Building' approach to Design Fiction describes strategies that place emerging technologies in potential futures, this work expands the scope of these prototypes to create a world within which audiences co-produce a `lived' experience of the future as an `Experiential Design Fiction'. By combining the audience's context with the fiction's diegesis this research demonstrates a method for extrapolating today's emerging technologies to create an immersive experience of a possible mundane reality of tomorrow.},
keywords = {},
pubstate = {published},
tppubtype = {conference}
}
343. Gradinar, Adrian; Lindley, Joseph Galen; Coulton, Paul; Ian, Forrester; Stenton, Phil: Situated Immersion: The Living Room of the Future. In: Adjunt Proceedings of TVX 2019, Figshare, 0000. (Type: Proceedings Article | Abstract | Links | BibTeX) @inproceedings{proc-in-gradinar_situated_2019,
title = {Situated Immersion: The Living Room of the Future},
author = {Adrian Gradinar and Joseph Galen Lindley and Paul Coulton and Forrester Ian and Phil Stenton},
url = {https://tvx.acm.org/2019/},
booktitle = {Adjunt Proceedings of TVX 2019},
publisher = {Figshare},
abstract = {This paper presents the Living Room of the Future which explores new forms of immersive experience which utilise Object Based Media to provision media that is personalised, adaptable, dynamic, and responsive. It builds upon previous research on Perceptive Media, Internet of Things Storytelling, and Experiential Futures which, in contrast to approaches that simply conflate immersion with increased visual fidelity, proposes subtle and nuanced ways to immerse audiences in a situated context. The room-sized prototype demonstrates this approach to immersion and includes connected devices that provide contextual data to personalise the media as well as physical elements that enhance the immersive experience.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}
344. Lovett, Leah; Hay, Duncan; Hudson-Smith, Andy; Jode, Martin: Mobile Communications Technologies in Tree Time: The Listening Wood. In: vol. 54, no. 2, pp. 220–221, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-lovett_mobile_2021,
title = {Mobile Communications Technologies in Tree Time: The Listening Wood},
author = {Leah Lovett and Duncan Hay and Andy Hudson-Smith and Martin Jode},
doi = {10.1162/leon_a_02006},
volume = {54},
number = {2},
pages = {220--221},
publisher = {MIT Press - Journals},
abstract = {This article presents a practice-led investigation by a cross- disciplinary team of artists and computer scientists into the potential for mobile and digital communications technologies to engage visitors to London's Hampstead Heath with the histories of its veteran urban trees. Focusing on the application of Internet of Things (IoT) technologies within the arboreal environment for the digital poetic walk, The Listening Wood, it considers the reciprocal impact of "tree time" on the development of "slow tech."},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
345. O'Hara, Kieron: Explainable AI and the philosophy and practice of explanation. In: vol. 39, pp. 105474, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-ohara_explainable_2020,
title = {Explainable AI and the philosophy and practice of explanation},
author = {Kieron O'Hara},
url = {https://doi.org/10.1016%2Fj.clsr.2020.105474},
doi = {10.1016/j.clsr.2020.105474},
volume = {39},
pages = {105474},
publisher = {Elsevier BV},
abstract = {Considerations of the nature of explanation and the law are brought together to argue that computed accounts of AI systems' outputs cannot function on their own as explanations of decisions informed by AI. The important context for this inquiry is set by Article 22(3) of GDPR. The paper looks at the question of what an explanation is from the point of view of the philosophy of science - i.e. it asks not what counts as explanatory in legal terms, or what an AI system might compute using provenance metadata, but rather what explanation as a social practice consists in, arguing that explanation is an illocutionary act, and that it should be considered as a process, not a text. It cannot therefore be computed, although computed accounts of AI systems are likely to be important inputs to the explanatory process.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
346. Radanliev, Petar; Roure, David Charles De; Walton, Rob: Data mining and analysis of scientific research data records on Covid-19 mortality, immunity, and vaccine development - In the first wave of the Covid-19 pandemic. In: vol. 14, no. 5, pp. 1121–1132, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-radanliev_data_2020,
title = {Data mining and analysis of scientific research data records on Covid-19 mortality, immunity, and vaccine development - In the first wave of the Covid-19 pandemic},
author = {Petar Radanliev and David Charles De Roure and Rob Walton},
url = {https://doi.org/10.1016%2Fj.dsx.2020.06.063},
doi = {10.1016/j.dsx.2020.06.063},
volume = {14},
number = {5},
pages = {1121--1132},
publisher = {Elsevier BV},
abstract = {Background and aims
Covid-19 is a global pandemic that requires a global and integrated response of all national medical and healthcare systems. Covid-19 exposed the need for timely response and data sharing on fast spreading global pandemics. In this study, we investigate the scientific research response from the early stages of the pandemic, and we review key findings on how the early warning systems developed in previous epidemics responded to contain the virus.
Methods
We conducted data mining of scientific literature records from the Web of Science Core Collection, using the topics Covid-19, mortality, immunity, and vaccine. The individual records are analysed in isolation, and the analysis is compared with records on all Covid-19 research topics combined. The data records are analysed with commutable statistical methods, including R Studio's Bibliometrix package, and the Web of Science data mining tool.
Results
From historical analysis of scientific data records on viruses, pandemics and mortality, we identified that Chinese universities have not been leading on these topics historically. However, during the early stages of the Covid-19 pandemic, the Chinese universities are strongly dominating the research on these topics. Despite the current political and trade disputes, we found strong collaboration in Covid-19 research between the US and China. From the analysis on Covid-19 and immunity, we wanted to identify the relationship between different risk factors discussed in the news media. We identified a few clusters, containing references to exercise, inflammation, smoking, obesity and many additional factors. From the analysis on Covid-19 and vaccine, we discovered that although the USA is leading in volume of scientific research on Covid-19 vaccine, the leading 3 research institutions (Fudan, Melbourne, Oxford) are not based in the USA. Hence, it is difficult to predict which country would be first to produce a Covid-19 vaccine.
Conclusions
We analysed the conceptual structure maps with factorial analysis and multiple correspondence analysis (MCA), and identified multiple relationships between keywords, synonyms and concepts, related to Covid-19 mortality, immunity, and vaccine development. We present integrated and corelated knowledge from 276 records on Covid-19 and mortality, 71 records on Covid-19 and immunity, and 189 records on Covid-19 vaccine.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
Covid-19 is a global pandemic that requires a global and integrated response of all national medical and healthcare systems. Covid-19 exposed the need for timely response and data sharing on fast spreading global pandemics. In this study, we investigate the scientific research response from the early stages of the pandemic, and we review key findings on how the early warning systems developed in previous epidemics responded to contain the virus.
Methods
We conducted data mining of scientific literature records from the Web of Science Core Collection, using the topics Covid-19, mortality, immunity, and vaccine. The individual records are analysed in isolation, and the analysis is compared with records on all Covid-19 research topics combined. The data records are analysed with commutable statistical methods, including R Studio's Bibliometrix package, and the Web of Science data mining tool.
Results
From historical analysis of scientific data records on viruses, pandemics and mortality, we identified that Chinese universities have not been leading on these topics historically. However, during the early stages of the Covid-19 pandemic, the Chinese universities are strongly dominating the research on these topics. Despite the current political and trade disputes, we found strong collaboration in Covid-19 research between the US and China. From the analysis on Covid-19 and immunity, we wanted to identify the relationship between different risk factors discussed in the news media. We identified a few clusters, containing references to exercise, inflammation, smoking, obesity and many additional factors. From the analysis on Covid-19 and vaccine, we discovered that although the USA is leading in volume of scientific research on Covid-19 vaccine, the leading 3 research institutions (Fudan, Melbourne, Oxford) are not based in the USA. Hence, it is difficult to predict which country would be first to produce a Covid-19 vaccine.
Conclusions
We analysed the conceptual structure maps with factorial analysis and multiple correspondence analysis (MCA), and identified multiple relationships between keywords, synonyms and concepts, related to Covid-19 mortality, immunity, and vaccine development. We present integrated and corelated knowledge from 276 records on Covid-19 and mortality, 71 records on Covid-19 and immunity, and 189 records on Covid-19 vaccine.347. Anthi, Eirini; Williams, Lowri; Rhode, Matilda; Burnap, Peter; Wedgbury, Adam: Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems. In: vol. 58, pp. 102717, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-anthi_adversarial_2021,
title = {Adversarial attacks on machine learning cybersecurity defences in Industrial Control Systems},
author = {Eirini Anthi and Lowri Williams and Matilda Rhode and Peter Burnap and Adam Wedgbury},
url = {https://doi.org/10.1016%2Fj.jisa.2020.102717},
doi = {10.1016/j.jisa.2020.102717},
volume = {58},
pages = {102717},
publisher = {Elsevier BV},
abstract = {The proliferation and application of machine learning-based Intrusion Detection Systems (IDS) have allowed for more flexibility and efficiency in the automated detection of cyber attacks in Industrial Control Systems (ICS). However, the introduction of such IDSs has also created an additional attack vector; the learning models may also be subject to cyber attacks, otherwise referred to as Adversarial Machine Learning (AML). Such attacks may have severe consequences in ICS systems, as adversaries could potentially bypass the IDS. This could lead to delayed attack detection which may result in infrastructure damages, financial loss, and even loss of life. This paper explores how adversarial learning can be used to target supervised models by generating adversarial samples using the Jacobian-based Saliency Map attack and exploring classification behaviours. The analysis also includes the exploration of how such samples can support the robustness of supervised models using adversarial training. An authentic power system dataset was used to support the experiments presented herein. Overall, the classification performance of two widely used classifiers, Random Forest and J48, decreased by 6 and 11 percentage points when adversarial samples were present. Their performances improved following adversarial training, demonstrating their robustness towards such attacks.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
348. Webster, Matt; Breza, Michael J.; Dixon, Clare; Fisher, Michael; McCann, Julie A.: Exploring the effects of environmental conditions and design choices on IoT systems using formal methods. In: vol. 45, pp. 101183, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-webster_exploring_2020,
title = {Exploring the effects of environmental conditions and design choices on IoT systems using formal methods},
author = {Matt Webster and Michael J. Breza and Clare Dixon and Michael Fisher and Julie A. McCann},
url = {https://doi.org/10.1016%2Fj.jocs.2020.101183},
doi = {10.1016/j.jocs.2020.101183},
volume = {45},
pages = {101183},
publisher = {Elsevier BV},
abstract = {Wireless communication protocols are often used in critical applications, e.g., urban water supply networks or healthcare monitoring within the Internet of Things. It is essential that control software and protocols for such systems are verified to be both robust and reliable. The effects on the hardware caused by environmental conditions and the choice of parameters used by the protocol are among the largest obstacles to robustness and reliability in wireless systems. In this paper we use formal verification to verify that a wireless sensor network synchronization and dissemination protocol is not adversely affected by these factors.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
349. Wachter, Sandra; Mittelstadt, Brent Daniel; Floridi, Luciano: Why a Right to Explanation of Automated Decision-Making Does Not Exist in the General Data Protection Regulation. In: vol. 7, no. 2, pp. 76–99, 0000. (Type: Journal Article | Abstract | Links | BibTeX | Altmetric) @article{art-wachter_why_2017,
title = {Why a Right to Explanation of Automated Decision-Making Does Not Exist in the General Data Protection Regulation},
author = {Sandra Wachter and Brent Daniel Mittelstadt and Luciano Floridi},
url = {https://doi.org/10.1093%2Fidpl%2Fipx005},
doi = {10.1093/idpl/ipx005},
volume = {7},
number = {2},
pages = {76--99},
publisher = {Oxford University Press (OUP)},
abstract = {Since approval of the European Union General Data Protection Regulation (GDPR) in 2016, it has been widely and repeatedly claimed that a 'right to explanation' of all decisions made by automated or artificially intelligent algorithmic systems will be legally mandated by the GDPR once it is in force, in 2018.
However, there are several reasons to doubt both the legal existence and the feasibility of such a right. In contrast to the right to explanation of specific automated decisions claimed elsewhere, the GDPR only mandates that data subjects receive meaningful, but properly limited, information (Articles 13-15) about the logic involved, as well as the significance and the envisaged consequences of automated decision-making systems, what we term a 'right to be informed'.
The ambiguity and limited scope of the 'right not to be subject to automated decision-making' contained in Article 22 (from which the alleged 'right to explanation' stems) raises questions over the protection actually afforded to data subjects. ApplicationsThese problems show that the GDPR lacks precise language as well as explicit and well-defined rights and safeguards against automated decision-making, and therefore runs the risk of being toothless.
We propose a number of legislative steps that, if implemented, may improve the transparency and accountability of automated decision-making when the GDPR comes into force in 2018.},
keywords = {},
pubstate = {published},
tppubtype = {article}
}
However, there are several reasons to doubt both the legal existence and the feasibility of such a right. In contrast to the right to explanation of specific automated decisions claimed elsewhere, the GDPR only mandates that data subjects receive meaningful, but properly limited, information (Articles 13-15) about the logic involved, as well as the significance and the envisaged consequences of automated decision-making systems, what we term a 'right to be informed'.
The ambiguity and limited scope of the 'right not to be subject to automated decision-making' contained in Article 22 (from which the alleged 'right to explanation' stems) raises questions over the protection actually afforded to data subjects. ApplicationsThese problems show that the GDPR lacks precise language as well as explicit and well-defined rights and safeguards against automated decision-making, and therefore runs the risk of being toothless.
We propose a number of legislative steps that, if implemented, may improve the transparency and accountability of automated decision-making when the GDPR comes into force in 2018.350. Seymour, William; Kraemer, Martin J.; Binns, Reuben Daniel; Kleek, Max Goodwin Van: Informing the Design of Privacy-Empowering Tools for the Connected Home. In: CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, ACM, 0000. (Type: Proceedings Article | Abstract | Links | BibTeX | Altmetric) @inproceedings{proc-in-seymour_informing_2020,
title = {Informing the Design of Privacy-Empowering Tools for the Connected Home},
author = {William Seymour and Martin J. Kraemer and Reuben Daniel Binns and Max Goodwin Van Kleek},
url = {https://doi.org/10.1145%2F3313831.3376264},
doi = {10.1145/3313831.3376264},
booktitle = {CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems},
publisher = {ACM},
abstract = {Connected devices in the home represent a potentially grave new privacy threat due to their unfettered access to the most personal spaces in people's lives. Prior work has shown that despite concerns about such devices, people often lack sufficient awareness, understanding, or means of taking effective action. To explore the potential for new tools that support such needs directly we developed Aretha, a privacy assistant technology probe that combines a network disaggregator, personal tutor, and firewall, to empower end-users with both the knowledge and mechanisms to control disclosures from their homes. We deployed Aretha in three households over six weeks, with the aim of understanding how this combination of capabilities might enable users to gain awareness of data disclosures by their devices, form educated privacy preferences, and to block unwanted data flows. The probe, with its novel affordances-and its limitations-prompted users to co-adapt, finding new control mechanisms and suggesting new approaches to address the challenge of regaining privacy in the connected home.},
keywords = {},
pubstate = {published},
tppubtype = {inproceedings}
}