BCIT Citations Collection | BCIT Institutional Repository

BCIT Citations Collection

Security and trust for surveillance cameras
Proceedings of 2017 IEEE Conference on Communications and Network Security (CNS) in Las Vegas, NV, USA, USA on 9-11 Oct. 2017.We address security and trust in the context of a commercial IP camera. We take a hands-on approach, as we not only define abstract vulnerabilities, but we actually implement the attacks on a real camera. We then discuss the nature of the attacks and the root cause; we propose a formal model of trust that can be used to address the vulnerabilities by explicitly constraining compositionality for trust relationships., Conference paper, Published.
Structured documents
Proceedings of 2012 European Intelligence and Security Informatics Conference (EISIC) in Odense, Denmark 22-24 Aug. 2012. Much of the information exchanged between agents over a network is encapsulated in XML documents. An XML document has a tree structure, and the meaning of the document can be understood in terms of a set of label-value pairs. The content of a document is often secured through digital signatures applied to different sections, while the document is passed between several agents. In this paper, we illustrate that this process is insecure in the sense that a malicious agent can deceive an honest agent to hold beliefs that are untrue. We provide a formal framework for analyzing the security of structured documents, based on the implicit epistemic impact that a signed document will have on a recipient. This kind of analysis can provide significant insight into deception and fraud detection., Conference paper, Published.
Student emotions with an edu-game
Proceedings of 2013 Humaine Association Conference on Affective Computing and Intelligent Interaction, Geneva, Switzerland, 2-5 Sept. 2013. We present the results of a study that explored the emotions experienced by students during interaction with an educational game for math (Heroes of Math Island). Starting from emotion frameworks in affective computing and education, we considered a larger set of emotions than in related research. For emotion labeling, we employed a standard method that relies on trained judges to report emotions over 20-second intervals. However, we asked judges to report all observed emotions in each interval, as opposed to only choosing one, as is standard practice. This variation allows us to discuss the appropriateness of this interval for emotion labeling. We present a detailed analysis of inter-coder reliability, both aggregated and over individual students, that considers not only the matching by judges over emotion type, but also the number of emotions detected., Conference paper, Published., Peer reviewed