The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Applications in computer network security, social media analysis, and other areas rely on analyzing a changing environment. The data is rich in relationships and lends itself to graph analysis. Traditional static graph analysis cannot keep pace with network security applications analyzing nearly one million events per second and social networks like Facebook collecting 500 thousand comments per second...
Increasingly, trust has played a crucial role in the security of an IoT system from its inception to the end of its lifecycle. A device has to earn some level of trust even before it is authenticated for admission to the system. Furthermore, once the device is admitted to the system, it may behave maliciously over time; hence its behavior must be evaluated constantly in the form of trust to ensure...
Middleboxes present new requirements that need to be integrated with traffic engineering applications that are already complex and consider myriad factors (e.g., routing, QoS, load-balancing). While it is possible to revisit traffic engineering algorithms to explicitly integrate middleboxes, such an approach is not compositional. Existing efforts at compositional SDN application development do not...
Mobile ad hoc networks (MANET) is a type of networks that consists of autonomous nodes connecting directly without a top-down network architecture or central controller. Absence of base stations in MANET force the nodes to rely on their adjacent nodes in transmitting messages. The dynamic nature of MANET makes the relationship between nodes untrusted due to mobility of nodes. A malicious node may...
Delay Tolerant Network is a buzz word in Mobile Adhoc Network. Research in this direction started with the approach for interplanetary communication. Delay Tolerant Network (in short) DTN is an evolving research area. A way to store, carry and forward messages over the underlying existing infrastructure. The intermittent connectivity and limited resources of a DTN node make the routing difficult to...
As its complexity grows, securing a system is harder than it looks. Even with efficient security mechanisms, their configuration remains a complex task. Indeed, the current practice is the hand-made configuration of these mechanisms to protect systems about which we generally lack information. Cloud computing brings its share of new security concerns but it may also be considered as leverage to overcome...
This talk presents results recently published in Software Testing, Verification and Reliability. In recent years, important efforts have been made for offering a dedicated language for modelling and verifying/proving security protocols. However, verifying the security protocol model does not guarantee that the actual implementation of the protocol will fulfil these properties. In this talk we present...
The goal of this paper is to construct an adaptive scheme that uses combinatorial keying for heterogeneous mobile wireless sensor nodes (ACKS-HWSN). Most of the previous work in security of WSN deals with homogeneous sensor nodes (SNs). In homogeneous WSNs, all sensors have similar resources (such as memory capacity, and battery life). Many techniques designed for these networks suffer from communication...
Provides an abstract for each of the presentations and a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.
Provenance of Big Data is a hot-topic in the database and data mining research communities. Basically, provenance is the process of detecting the lineage and the derivation of data and data objects, and it plays a major role in database management systems as well as in workflow management systems and distributed systems. Despite this, provenance of big data research is still in its embryonic phase,...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
In this advanced era, thousands of students, apply for the admission test which is a rigorous academic system, build on a foundation of high-quality assessments that have been adopted around countrywide to consent to enter into tertiary education both at private and public universities in Bangladesh. Among them, thousands of students apply to several universities at the same time where they have to...
In recent years P2P computing systems gain popularity and impact due to the anonymity, dynamism, scalability, and cost sharing. Due to autonomy of peers and open environment, security is big issue in P2P computing systems. Traditional security mechanisms used in centralized systems are not suited for P2P computing systems because there is no central point of authority. The working of a P2P computing...
With the rapid growth of the number of papers, the traditional methods of searching papers by scholar search engine are becoming unacceptable. These methods can't meet the needs of users and users still need to take a lot of time to filter the search results. To solve the problem, this paper uses the concepts and methods of community partition and introduces a model to recommend authoritative papers...
Computing systems today have a large number of security configuration settings that enforce security properties. However, vulnerabilities and incorrect configuration increase the potential for attacks. Provable verification and simulation tools have been introduced to eliminate configuration conflicts and weaknesses, which can increase system robustness against attacks. Most of these tools require...
The first workshop on compliance, evolution, and security in cross-organizational processes (CeSCoP 2014) is held in conjunction with the 18th IEEE International Enterprise Computing Conference (EDOC 2014), in Ulm, Germany. The workshop purpose is to offer a portal for researchers and practitioners to discuss and contribute research on cross-organizational processes. The CeSCoP 2014 program includes...
This paper argues about a new conceptual modeling language for the White-Box (WB) security analysis. In the WB security domain, an attacker may have access to the inner structure of an application or even the entire binary code. It becomes pretty easy for attackers to inspect, reverse engineer, and tamper the application with the information they steal. The basis of this paper is the 14 patterns developed...
Current state-of-the-art infrastructure-centric deployment and management of distributed web-scale applications cannot scale and meet the demands of changing workloads and increasing demands on application availability, mobility and security. The DIME network architecture has matured during the last four years to offer an alternative to provide a post-Hyper visor, Hyper-Cloud network of applications...
Anomaly detection is essential for preventing network outages and maintaining the network resources available. However, to cope with the increasing growth of Internet traffic, network anomaly detectors are only exposed to sampled traffic, so harmful traffic may avoid detector examination. In this paper, we investigate the benefits of recent distributed computing approaches for real-time analysis of...
In this paper, a framework for anomaly detection and forensics in Big Data is introduced. The framework tackles the Big Data 4 Vs: Variety, Veracity, Volume and Velocity. The varied nature of the data sources is treated by transforming the typically unstructured data into a highly dimensional and structured data set. To overcome both the uncertainty (low veracity) and high dimension introduced, a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.