The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data-parallel applications often generate hundreds of flows at the same time in data centers. Since these flows are always connected with application context, traditional flow-level optimization policies are hard to perform well in such collections. The coflow abstraction brings hope and opportunity to make the scheduling much more efficient. But exsiting schedule systems based on that related concept...
Every day numerous new vulnerabilities and exploits are reported for a wide variety of different software configurations. There is a big need to be able to quickly assess associated risks and sort out which vulnerabilities that are likely to be exploited in real-world attacks. A small percentage of all vulnerabilities account for almost all the observed attack volume. We use machine learning to make...
In Distributed Virtualized Environment, service components on a dependable service path will be selected to implement service composition. Searching for the optimal dependable service path is the key to implement dependability assurance, which is a Multi-Constrained Optimal Path problem. However, the existing algorithms have disadvantages of high complexity and low performance, and lacking the consideration...
Web Ontology Language (OWL) is used by domain experts to encode knowledge. OWL primarily only supports the subClassOf (is-a or inheritance) relation. Various other relations, such as partOf, are essential for representing information in various fields including all engineering disciplines. The current syntax of OWL does not support the declaration and usage of new custom relations. Workarounds to...
An I/O intensive application is one of the most common applications in cloud computing, which is a dominant type in some occasions. However, few studies have focused on how to improve the processing efficiency of such specific type of applications. We have found out the performance bottlenecks based on the features obtained from I/O-intensive applications. By analyzing the features of files, we put...
The development of Web bots capable of exhibiting human-like browsing behavior has long been the goal of practitioners on both side of security spectrum -- malicious hackers as well as security defenders. For malicious hackers such bots are an effective vehicle for bypassing various layers of system/network protection or for obstructing the operation of Intrusion Detection Systems (IDSs). For security...
Cyber security has been used interchangeably for information security, where later considers the role of the human in the security process while former consider this as an additional dimension and also, focus person has a potential target. However, such discussion on cyber security has important implication as it focuses on the ethical part of the society as a whole. To address the issue of cyber...
One of the most logical applications of face recognition for authentication is on mobile handset devices. However, face recognition still faces challenges in providing environment tolerance: being able to compensate for changes in light conditions within an environment where authentication is occurring, due to users carrying their mobile handset devices to different locations with varying and unpredictable...
Building an effective Model Risk Management (MRM) system requires advanced skills in mutliple fields, such as technology, econometrics, and business. It is a dilemma that MRM practitioners are struggling with. Very often the enterprises are seeking someone who can understand their business ideas and transform them to technology solutions or come up with technology solutions to support their MRM ideas...
The generation of representative computer system behavior profile from system calls in LINUX environments to establish reliable Host Based Anomaly Detection Systems (HADS) against Next Generation of Attacks (NGA) is a challenge due to two major reasons. Firstly, NGA causes a low footprint upon host activities and consequently, attack activities are difficult to detect from normal computer processes...
Cybersecurity is among the highest priorities in industries, academia and governments. Cyber-threats information sharing among different organizations has the potential to maximize vulnerabilities discovery at a minimum cost. Cyber-threats information sharing has several advantages. First, it diminishes the chance that an attacker exploits the same vulnerability to launch multiple attacks in different...
Looking at recent cyber-attacks in the news, a growing complexity and sophistication of attack techniques can be observed. Many of these attacks are performed in multiple steps to reach the core of the targeted network. Existing signature detection solutions are focused on the detection of a single step of an attack, but they do not see the big picture. Furthermore, current signature languages cannot...
Multi-exponentiation is very important in varies cryptographic and digital signatures. In the situation like electronic cash and SNS websites, the server need to answer a mass of requests in a short time. With every request, there are always processes of encryption, decryption, signature and verification. In these processes, there are large amount of computations of multi-exponentiation, which shows...
The MapReduce programming model has been widely used in Big Data and Cloud applications. Criticism on its inflexibility when being applied to complicated scientific applications recently emerges. Several techniques have been proposed to enhance its flexibility. However, some of them exert special requirements on applications, while others fail to support the increasingly popular coprocessors, such...
A major concern of users of cloud storage services is the lost of control over security, availability and privacy of their files. That is partially addressed by end-to-end encryption techniques. However, most of the solutions currently available offer rigid functionalities that cannot be rapidly integrated into customized tools to meet user's requirements like, for example, file sharing with other...
Hypervisors play an important role in the virtualised environment and consequently are a prime target for attacks. Different kinds of attacks have been reported and a great deal of research has been done to address vulnerabilities in hypervisors. Recently, after successful defeat of integrity measurement tools, a new class of measurement tools have been developed capitalising on the SMM to measure...
As a mobile operating system framework, Android plays a significant role in supporting mobile apps. Using cloud-based approaches have further enabled the implementations of mobile apps. However, current Android application model is not efficient by using current common approaches. In this paper, we proposed a new mobile app model using precache technology to overcome the current existing obstacles...
The confidentiality and verification of customer's data at the cloud service provider (CSP) side becomes a critical issue in terms of both reliability (i.e., the trust aspect) and efficiency (i.e., the ease of performing such verifications). As data owners no longer physically possess their data storage, traditional cryptographic primitives for the purpose of data security protection cannot be directly...
Robust CYBersecurity information EXchange (CYBEX) infrastructure is envisioned to protect the firms from future cyber attacks via collaborative threat intelligence sharing, which might be difficult to achieve via sole effort. The executive order from the U. S. federal government clearly encourages the firms to share their cybersecurity breach and patch related information among other federal and private...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.