The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditional cloud storage has relied almost exclusively on large storage providers, who act as trusted third parties to transfer and store data. This model poses a number of issues including data availability, high operational cost, and data security. In this paper, we introduce a system that leverages blockchain technology to provide a secure distributed data storage with keyword search service....
There has been a significant growth in the interest to outsource data as well as operational services to clouds. Data outsourcing deprives the data owners of direct control over their data and this introduces new privacy risks. Data encryption has been introduced to address the data confidentiality issue. However, the management of encrypted data poses several challenges, the most important one is...
We notice, in our experiments with three malware samples of Darkcomet, Andromeda, and Zeus, that all three of them generate highly periodic network traffic. In addition, while there are a few works on intrusion detection which are based on this periodic behavior of malware, the prevalence of this behavior among the malware families in the wild is unknown. In this paper, we conduct an extensive experimental...
The increased computation and storage capabilities of smartphones have attracted more and more cybercriminals to write mobile malware for different purposes. Due to the popularity of smartphones in both personal life and business, it is empowering an emerging mobile security threat issue. In this paper, we present an intrusion detection system that incorporates not only network features but also host-based...
Together with the popularity of graph structure in real world data, graph analysis has become an attractive research topic. Triangle counting is one of typical graph mining tasks and plays a significant role in complex network analysis, with a wide range of applications in social network analysis, spam detection, and computer-aided design applications. Given the sensitive nature of graph data, the...
Amplified and disrupting cyber-attacks might lead to severe security incidents with drastic consequences such as large property damage, sensitive information breach, or even disruption of the national economy. While traditional intrusion detection and prevention system might successfully detect low or moderate levels of attack, the cooperation among different organizations is necessary to defend against...
Reachability refers to the ability to get from one vertex to another within a graph. In this paper, we investigate the reachability problem on a distributed graph. We consider the scenario where there are two parties, each in possession of a private set of edges, while the vertices are public. The two parties wish to securely determine whether two particular vertices are connected but do not want...
In recent years, online social networks have become a popular avenue for users to interact and engage in social activities. The volume of data handled by social networks is staggering: there are about 3, 000 picture uploads to Flickr each minute, 190 million tweets posted from all over the world each day, 70 billion pieces of contents shared on Facebook, and so on. Current terms of service of most...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.