The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The need to investigate the atomic constituents of biological network has led to increasing popularity of topological studies. A biological network is a graphical representation of the interactome with nodes and edges. Therefore, graph theoretic measures can be applied to such networks. We have performed an empirical study comparing a number of centrality measures, viz., betweenness centrality, eigenvector...
Since networked applications have become common place in our daily life, vulnerabilities or attacks on networks are also on the rise. Although a significant number of defense mechanisms have been developed to counter attacks on networks, attackers are often able to evade deployed defense mechanisms. An effective defense mechanism generates alerts when it finds vulnerabilities on a system or in a network...
Protein-Protein Interaction (PPI) networks are believed to be important sources of information related to biological processes and complex metabolic functions of the cell. Identifying protein complexes are of great importance for understanding cellular organization and functions of organisms. In this work, we propose a method to find protein complexes in a PPI network based on topological structure,...
The paper presents a DDoS attack detection method using a new statistical measure called FFSc. The method computes a similarity value using FFSc for each sample of network traffic and if the score is greater than a threshold, attack alarm is generated. The method computes attack intensity of a sample to detect the type either as low-rate or high-rate. The method is evaluated on two network datasets...
With the availability of high precision MRI scanners helps in automatic clinical analysis of human brain for tumor detection. Cerebral cortex extraction from brain MR images is a challenging task due to its highly convoluted complex structures. In this paper we first extract cerebral cortex from MRI using morphological approach. Next we segment gray and white matters using DenSeg, a Density based...
Threats of distributed denial of service (DDoS) attacks have been increasing day-by-day due to rapid development of computer networks and associated infrastructure, and millions of software applications, large and small, addressing all varieties of tasks. Botnets pose a major threat to network security as they are widely used for many Internet crimes such as DDoS attacks, identity theft, email spamming,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.