The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Wide-reaching usage of the standard called as IEEE 802.111 has been acting as a solution to support aggressive network coverage with high bandwidth raised various security threats. The wide use of the Wi-Fi (Wireless Fidelity) has enabled us to easily access the internet and it has also paved way for the origin of many hacking attacks. Anomaly detection as applied to detecting active data breaches...
The Social-Collaborative Internet of Things (SCIoT) provides the ability for objects to autonomously establish social relationship among them based on the rules imposed by its owners'. This paper proposes a new secure framework for SCIoTto tackle the issues related to security and privacy. The proposed framework adopts a decentralized architecture to handle the problems of large-scale deployment and...
Today the world is under virtually constant attack, targeted by increasingly sophisticated and well funded attackers. The increasing efficacy of cyber threats continues to highlight the inadequacies of traditional defense mechanism such as firewalls and Intrusion Detection System. The security analyst however focuses on finding the technical deficiency but do not consider the adversaries motivations...
Testing of mobile applications which run on smart devices is more complex due to diversity of mobile devices and computational resources. Mobile testing using emulators which doesn't include real network traffic and testing mobile applications in more than one portable device in single system was also not possible in normal testing. In order to overcome the draw backs of normal testing, in this paper...
The rapid evolution of the internet led to a development of an effective tool for coping with information overload. Recommendation system is one of the most widely adopted and perceptible technologies for solving information overload issue. Collaborative filtering is the most popular technique used in recommender system. But it has several limitation such as sparsity, scalability and most vital of...
Mobile application is application software intended to be deployed and used on any portable devices. Online mobile applications are widely used in many critical areas such as online shopping, ticket booking, E-commerce, etc. The quality of these applications depends upon network related factors that may affect the normal working of the application under poor performance. So there is a need to test...
The testing of mobile application faces many issues due to the complexity of testing these applications and the limited resources available in mobile devices. Testing in various mobile devices under varying conditions takes a lot of time when done manually. Also by using emulators it is not possible to generate the same real time network connections and real device characteristics. There is a need...
Recommender system plays a significant role in reducing the information overload on the sites where users have searched and contented. Existing approaches which deals with such recommendation system apply collaborative filtering techniques to specify the most alike users whom they hope to make recommendations. Collaborative Filtering will significantly show better improvement with the enclosure of...
Emerging internet technologies rely on Mobile IPv6 services. Home Agent is a key component for such services as it holds the binding association information. Whenever the mobile node changes its point of attachment, it updates the binding information to a Home Agent. In Mobile IPv6, Home Agent addresses are discovered by mobile node via Dynamic Home Agent Address Discovery mechanism. It is the responsibility...
Backups protect the file systems from disk or other hardware failures, software errors that may corrupt the file system and natural disasters. However, a single file may be present as multiple copies in the file system. Hence searching time to find the redundant data and to eliminate them is high. In addition to this, redundant data consumes more space in storage systems. Data de-duplication techniques...
The recent invasion of social networks makes it inevitable to construct a trust network. Recommender systems at present uses advanced parallelism in web development. But attaining trustworthiness in such a system has been a challenging task in research work for several years. To overcome the issues in the existing work such as sparsity, scalability and to eliminate distrust users in the network, the...
With the advent of the Web and various specialized digital libraries, the automatic extraction of useful information from text has become an increasingly important research in Data mining. In this paper we present a new MH based algorithm that extracts both the topics expressed in large text document collections and also models how the authors of documents use those topics. The methodology is illustrated...
Security threats for the network services have been constantly increasing day by day. Distributed denial of service (DDoS) attack is one such kind of security threat which involves multiple systems generating a large amount of traffic towards a target machine and thereby making any service from that target machine or server unavailable to its clients. This threat by nature needs no control over the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.