The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Online social networks (OSN) are developing rapidly. Most prior OSN researches have been focused on network application layer. However, the social relationships and topology characteristics of OSN can be utilized to enhance the function, performance and security of network protocols in every layer. This paper presents the concept of social-aware plane and designs a novel model (EPSP) to enhance network...
Alert fusion is a key problem in distributed intrusion detection system (DIDS). The paper proposes a distributed intrusion alert fusion scheme based on multiple keywords and routing infrastructure: distributed hash table (DHT). All the related alerts produced by local sensor can be routed and fused to their corresponding peers by multiple keywords, while evenly distributing unrelated alerts to different...
Alert fusion is a process that analyzes the alerts produced by one or more intrusion detection systems and provides a more succinct and high-level view of security event or attempted intrusions. Unfortunately, the serialized alerts by detected or created time will hide the intrinsic order between alerts. It is a disadvantage to alert fusion. In this paper, we proposed an alert fusion method based...
The most common task for a forensic investigator is to search a hard disk to find interesting evidences. While, the most search tools in digital forensic field fundamentally utilize text string match and index technology, which produce high recall (100%) and low precision. Investigators frequently waste vast time on huge irrelevant search hits. In this paper, we propose an improved method for ranking...
The architecture and characteristic of wireless mesh networks (WMN), as well as the significance of intrusion detection system (IDS) in its application were investigated. Based on the embedded analyzing of IDS technologies in ad hoc network and WLAN (wireless local area network), combined with the security requirements in WMN itself, it is concluded that both the architecture of distributed and cooperative...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.