The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Covert channels are used for information transmission in a manner that is not intended for communication and is difficult to detect. The authors have proposed and explored the way to counter the leakage of information via covert channels by introducing additional random delays before packets' sending. The main topic of the research is the case when the capacity of the covert channel without error...
The Internet of Things (IoT) is the next generation technology which is expected to bring a major revolution in the art of creating smarter environments. In order to uniquely identify each device in smart environment, a new protocol using IPv6 over Low-power Wireless Personal Area Network (6LoWPAN) has been developed which supports management of sleep cycles of device for power management. However...
As wireless technologies have been improving in recent years, a mobility management mechanism is required to provide seamless and ubiquitous mobility for end users who are roaming among points of attachment in wireless networks. Thus, Mobile IPv6 was developed by the Internet Engineering Task Force (IETF) to support the mobility service. However, Mobile IPv6 is unable to fulfill the requirements of...
Load balancing is one major cause of the false traceroute link problem in Internet topology measurements. In this paper, the problem of false traceroute links in the presence of per-packet load balancing is illustrated and analyzed. The false traceroute links in the presence of symmetric and asymmetric per-packet load balancing are analyzed and formulized independently. According to our analysis,...
The Traffic matrix Estimation of IP networks has become a research topic in this later 10 years, where several methods have been used to resolve this ill posed problem. This paper deals with the later and presents a comparison study on training algorithms in Artificial Neural Networks (ANN) method, namely the BFGS Quasi-Newton; the Levenberg-Marquardt and Bayesian Regularization algorithms, which...
The relevance of cross border security operations has been identified as a priority at European level for a long time. A European network where Public Protection and Disaster Relief (PPDR) forces share communications processes and a legal framework would greatly enforce response to disaster recovery and security against crime. Nevertheless, uncertainty on costs, timescale and functionalities have...
This paper proposes a framework for developing an automatic annotation tool of Romanian prosody for spontaneous and reading speech and a set of acoustic cues at the prosodic word level, necessary to accurately discriminate the prosodic phrases. Even though many approaches have considered the silence pause as an important acoustic cue in the automatic detection of the prosodic phrase boundaries, our...
One way for improving the tuple space search-based table lookup in the software system (e.g., flow matching process of Open vSwitch) is to reduce the number of tuple spaces to be examined. For this purpose, we discuss two approaches based on space-efficient data structures, Bloom filter and simTable proposed in this paper. Click-based experiments show that Bloom filter and simTable noticeably reduce...
A multi-faceted graph defines several facets on a set of nodes. Each facet is a set of edges that represent the relationships between the nodes in a specific context. Mining multi-faceted graphs have several applications, including finding fraudster rings that launch advertising traffic fraud attacks, tracking IP addresses of botnets over time, analyzing interactions on social networks and co-authorship...
Using GPUs reduces execution time of many applications but increases acquisition cost and power consumption. Furthermore, GPUs usually attain a relatively low utilization. In this context, remote GPU virtualization solutions were recently created to overcome the drawbacks of using GPUs. Currently, many different remote GPU virtualization frameworks exist, all of them presenting very different characteristics...
For the user packet data transmission security and privacy issues in xGSN of mobile communication network, we propose a "dynamic tunnel" defense mechanism based on GTP protocol. The method dynamically changes the Tunnel Endpoint Identifier (TEID) used for the transmission of user packets between SGSN and GGSN by building a mimicry gateway, which breaks the static correspondence between TEID...
While empowering a wide range of software engineering tasks, the traditional fine-grained software dependence (TSD) model can face great scalability challenges that hinder its applications. Many dependence abstraction approaches have been proposed, yet most of them either target very specific clients or model partial dependencies only, while others have not been fully evaluated for their accuracy...
As applications deployed in a smart space share the same physical environment, they may interfere (or even conflict) with one another. To guarantee the performance and user experience of the entire smart space, mechanisms for handling such interferes (or conflicts) have to be introduced. We believe that conflicts among multiple applications are caused by their different requirements and impacts on...
Understanding the behavior of an operations process and capturing it as an abstract process model has been shown to improve dependability significantly [1]. In particular, process context can be used for error detection, diagnosis, and even automated recovery. Creating the process model is an essential step in determining process context and, consequently, improving dependability. This paper describes...
This column introduces the Network Observatory, a human-centered cyber sensemaking system, and discusses the visual and sensemaking design principles employed therein.
Intonational phrase (IP) break prediction is an important aspect of front-end analysis in a text-to-speech system. Standard approaches for intonational phrase break prediction rely on the use of linguistic rules or more recently, lexicalized data-driven models. Linguistic rules are not robust while data-driven models based on lexical identity do not generalize across domains. To overcome these challenges,...
Today, Online audits give profitable data about items and administrations to buyers. On the other hand, spammers are joining the group attempting to deceive pursuers by composing fake surveys. Past endeavors for spammer identification utilized reviewers' behaviors, text similarity, linguistics features and rating patterns. Those studies have the capacity recognize certain sorts of spammers, e.g.,...
During the past two decades, event correlation has emerged as a prominent monitoring technique, and is essential for achieving better situational awareness. Since its introduction in 2001 by one of the authors of this paper, Simple Event Correlator (SEC) has become a widely used open source event correlation tool. During the last decade, a number of papers have been published that describe the use...
This paper discusses the design challenges associated with supporting advanced mobility services in the future Internet. The recent transition of the Internet from the fixed host-server model to one in which mobile platforms are the norm motivates a next-generation protocol architecture which provides integrated and efficient support for advanced mobility services. Key wireless access and mobility...
The Bag-of-Visual-Words model has become a popular model in image retrieval and computer vision. But when the local features of the Interest Points (IPs) are transformed into visual words in this model, the discriminative power of the local features are reduced or compromised. To address this issue, in this paper, we propose a novel contextual descriptor for local features to improve its discriminative...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.