The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Detecting anomalous behaviour in network flow data is challenging for a number of reasons, including both the computational demand associated with a large corporate network and the peculiar temporal characteristics of flow data. Relay-like behaviour refers to the rapid commencement of an out-going flow from a network device following the completion of an in-coming flow. This paper develops a computationally...
Network security analysts presently lack tools for routinely screening large collections of network traffic for structures of interest. This is particularly the case when the structures of interest are embodied as summaries of sets of related traffic, essentially behaviour descriptions. This paper sketches a methodology to provide such capability, in the context of flow data. The methodology generates...
The Internet and university campus network construction and popularization not only brings the new challenges to college education has brought unprecedented opportunities. Ideological and political education informatization is the inevitable developing trend of information age, but in the process of the concrete implementation in our country due to reasons such as cognition, and experience a lot of...
We present a comprehensive framework for automatic phishing incident processing and work in progress concerning automatic phishing detection and reporting. Our work is based upon the automatic phishing incident processing tool PhiGARo which locates users responding to phishing attack attempts and prevents access to phishing sites from the protected network. Although PhiGARo processes the phishing...
This article introduced a well water monitoring system based on Freescale Kinetis. In order to improve the efficiency of the local water resources, this system is well designed which is based on the objective condition of the water scarcity. this system can achieve functions which include the automatic control of the water-pump switch, remote monitor, power failure protection, the Data Backup and...
Detecting polling behaviour in a computer network has two important applications. First, the polling can be indicative of malware beaconing, where an undetected software virus sends regular communications to a controller. Second, the cause of the polling may not be malicious, since it may correspond to regular automated update requests permitted by the client, to build models of normal host behaviour...
The future home energy management system (HEMS) in smart grid will need to include contractual grid regulations imposed by the utility while also taking into consideration the domestic users' comfort, preferences, budget, and security. The emerging autonomous demand response (ADR) programs have initiated steps in utilizing sophisticated software algorithms for the scheduling and optimization of HEMS...
To tackle with problems emerging with rapid growth of information networks in scale and complexity, selforganization is one of promising design principles for future networks. Convergence of self-organizing controls, however, is pointed out to be comparatively slow in some practical applications. Therefore, it is important to reveal and enhance convergence of self-organizing controls. In controlled...
The emerging smart grid technologies and rapid installations of smart meters is encouraging many consumers to implement home energy management systems (HEMSs) in order to decrease their electric utility bills and increase the efficiency of energy consumption. Intrusive load monitoring (ILM) and non-intrusive load monitoring (NILM) are two approaches in the literature for appliance load monitoring...
Comparing to TCP traffic, the composition of UDP traffic is still unclear. Although it is observed that a large fraction of UDP traffic appears to be P2P applications, application level classification of UDP traffic is still very hard since most of these applications are private protocols based. In this paper, a novel method is proposed to classify UDP traffic. Based on the assumption that traffic...
Underwater gliders are a disruptive technology capable of transforming our understanding of the ocean. Efficient vehicle flight is critical for proper data collection, allowing successful completion of project goals. Slocum glider flights in less than 15 m of water have been only marginally successful, as use of deep water flight coefficients disables proper inflection at shallow depths. Groundings...
Even though online education is a very important pillar of lifelong education, institutions are still reluctant to wager for a fully online educational model. At the end, they keep relying on on-site assessment systems, mainly because fully virtual alternatives do not have the deserved social recognition or credibility. Thus, the design of virtual assessment systems that are able to provide effective...
In wireless sensor networks, an important challenge often faced in geographic greedy forwarding is the local minimum phenomenon which is caused by holes. For solving this problem, most hole-avoiding protocols route packets along the perimeter of holes or forbidden regions. Thus, sensor nodes on the perimeter of holes and forbidden regions exhaust their energy faster than others, which enlarge the...
Recently, Electronic Health Record (EHR) systems have gained a great attention in industry, research and public sectors in order to enhance the quality of healthcare. Security and privacy, however, are still major issues that require further investigations. The recognition of the significance of various security aspects in the adaptation of EHR solutions has been accompanied with an increasing research...
A fundamental solution of topical problem for economic, social and technological future of Ukraine and the world is proposed. The problem lies in the elimination of corruption through the formation and implementation of the state program «Creation of Cyber Physical Space for Digital Monitoring Technological Processes and Optimal Resource Management in order to Achieve Socially Important Goals». The...
We built a sleep activity monitoring system that can monitor the status and actions of the user of a hospital bed, such as leaving, sitting up, changing sides, or not moving on the bed. The system calculates the load on nine sensors under the mattress to monitor changes. This system was previously made exclusively for a bed produced by Voelker GmbH (Germany). For this trial, we adapted the system...
We review opportunities, impediments, regional scope and principles for a Canadian contribution to an Integrated Atlantic Ocean Observing System (IAOOS) in the context of the Galway Alliance. This contribution should build on what exists, plan ahead for data management and data access, be flexible and sustainable, encourage international involvement, be science-led, foster research aggregation, and...
In current cloud systems, services run across multiple geographically distributed clusters and continuously generate resource usage data due to constant resource consumption. In the context of accounting, resource usage data generated from each cluster during service runtime must be collected and aggregated into a single cloud-wide record so that a single bill can be created. This paper presents a...
The surgical resection of the epileptogenic zone (EZ) is the only effective treatment for many drug-resistant epilepsy (DRE) patients, but the pre-surgical identification of the EZ is challenging. This study investigates whether the EZ exhibits a computationally identifiable signature during seizures. In particular, we compute statistics of the brain network from intracranial EEG (iEEG) recordings...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.