The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The application layer attacks on internet are increasing day by day and this alarming situation has forced organizations to formulate new policies to overall increase the immunity of their systems against growing nature of these attacks. Published surveys reported that 60-80% of web based attacks target the application layer and more than 90% of web applications are vulnerable to these attacks. One...
Hierarchization by clustering is effective for scalable routing control in an ad hoc network. Due to a constraint from structural features of ad hoc networks, clustering in ad hoc networks should be autonomous decentralized algorithm based on local information. Bio-inspired approach gives a solution of such autonomous decentralized clustering mechanism and its well-known mechanism is based on reaction-diffusion...
P2P-Grid system provides a framework for converging Grid and peer-to-peer network to deploy large-scale distributed applications. However, Nodes dynamic participation arbitrarily that makes failure more common than in other systems. As the most common technique for fault tolerance, Check pointing-and-Recovery saves application execution state during normal execution and restoring the saved state after...
Most of the indoor wireless sensor networks need timely information from sensors during normal and specially emergency situation. Generally a sensor network is designed with sufficient capacity to meet the requirement in normal situation. The design consideration also includes the emergency situation to support up to certain level of emergency. But the emergency situation is unpredictable and difficult...
Cloud computing environments provide a resource pool for customers for their processing, storage and networking needs. It is necessary for customers to choose desirable configuration from vast resources available in the cloud. This paper proposes a heuristic model to choose a cloud configuration for efficient use. Trend analysis in data mining is used to predict the future trend and assist provisioning...
Communication is needed in cyber physical system (CPS) to convey information from sensors to controllers. In this paper, a wireless network is considered to serve as the communication infrastructure in CPS. The data traffic scheduling problem is studied for the purpose of system state stabilization. To measure the information amount of different packets, a virtual queue is defined based on the Delay-tolerant...
The concept of cooperative vehicle safety (CVS) is based on cooperation of vehicles in achieving real-time situation awareness for the purpose of safer (and possibly autonomous) driving. Since CVS is a safety system, situation awareness has to be real-time with high accuracy. Cooperation in the context of CVS is achieved through vehicular networks that are tuned to the purpose of vehicle state tracking...
Academic researchers in digital forensics often lack backgrounds in related laws. This ignorance could make their research and development legally invalid, or with less relevance in practice. To better assist academic researchers, we discuss related laws that regulate the government's investigation and summarize different requirements of acquiring data and evidence in different crime scene investigations...
IP trace back can be used to find the origins and paths of attacking traffic. However, so far, no Internet-level IP trace back system has ever been deployed because of deployment difficulties. In this paper, we present a flow-based trace back scheme on an AS-level overlay network (Easy Trace). In Easy Trace, it is not necessary to deploy any dedicated trace back software and hardware at routers, and...
Sina Weibo (Weibo) is a fast growing microblogging social network with total user size closer to Twitter. Weibo adopts a mechanism to verify users, so that the public can identify true accounts of celebrities and official channels of certain organizations. The verification mechanism builds trust and authenticity to the source, and hence, stimulates people to actively participate on the platform. However,...
Neighbor discovery is necessary for the proper functioning of wireless networks. Directional antennae can be used in the network to improve connectivity due to the fact that a narrower beam width can reach a faraway place using the same transmission power. Researches until now have worked on neighbor discovery using only omni directional antenna (OO), neighbor discovery using only directional antenna...
Online social networks have recently become an effective and innovative channel for spreading information and influence among hundreds of millions of end users. Most of prior work either carried out empirical studies or focus on the information diffusion modeling in temporal dimension, little attempt has been given on understanding information diffusion over both temporal and spatial dimensions. In...
Dark nets, anonymous and membership-concealing P2P networks, aim at providing censorship-resistance without relying on a central authority. An efficient routing algorithm is needed to create Dark nets that offer an acceptable performance to a large number of users. Designing such an algorithm is hard due to the restricted topology of Dark nets, which has not been modelled adequately up to now. We...
As the Online Social Networks (OSNs) amass un-precedented amounts of personal information, the privacy concerns gain considerable attention from the community. Apart from privacy-enabling approaches for existing OSNs, a number of initiatives towards building decentralized OSN infrastructures have emerged. However, before this paradigm becomes a serious alternative to current centralized infrastructures,...
Target coverage is an important problem in wireless sensor networks (WSNs), whose goal is to cover points of interest to collect data for further processing. With the emergence of mobile sensors, many researchers have exploited the mobility of sensors to improve coverage quality. However, little attention has been paid to minimize the sensor's movement, which consumes the majority of a sensor's limited...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.