The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Interconnected computer systems and services using networks have improved the dependence on the stored accumulated data. Interconnected systems via network, in turn, could expedite security attacks. Recently, network security and cryptography techniques have evolved, leading to the advancement of biometric-based smart cards technique to implement the security of networks. In this paper, we demonstrated...
Nowadays, more and more corporate and private users outsource their data to cloud service provider. It is provide lots of services to the users. Due to the large amount of data stored by multiple users on cloud one critical problem must be faced by users. In this large amount of data there are so many copies of repeated data. Data duplication is compress repeated data. We can use this technique To...
This paper compares the probability similarities between a cyberattack, the distributed denial-of-service, and the mathematical model of probability, Lévy walks. This comparison aims to explore the validity of Lévy walks as a model resembling the DDoS probability features. This research also presents a method, based on the Smirnov transform, for generating synthetic data with the statistical properties...
This paper has presented an approach of vTPM (virtual Trusted Platform Module) Dynamic Trust Extension (DTE) to satisfy the requirements of frequent migrations. With DTE, vTPM is a delegation of the capability of signing attestation data from the underlying pTPM (physical TPM), with one valid time token issued by an Authentication Server (AS). DTE maintains a strong association between vTPM and its...
Virtualization technology is widely used for sharing the abilities of computer systems by splitting the resources among various virtual PCs. In traditional computer systems, the utilization of hardware is not maximized and the resources are not fully consumed. By using the virtualization technology, the maximum utilization of computer system hardware is possible. Today, many organizations especially...
With the increase in Man-in-the-Middle (MITM) attacks capable of breaking Hypertext Transfer Protocol Secure (HTTPS) over the past five years, researchers tasked with the improvement of HTTPS must understand each attacks characteristics. However with the large amount of attacks it is difficult to discern attack differences, with out any existing classification system capable of classifying these attacks...
The resource allocation is an essential aspect of Data Center performance. The strategy between dynamic and dedicated resource allocation have objectives in performance and reliability. The performance consists of workload, usage, and processing performance. The study works in workload performance test in dynamic resource allocation. The research present the correlation between load handling memory...
Although cloud computing has made significant achievement, it still faces many challenges, such as slow interactive performance and unsatisfying user experience over a long-haul wide-area or wireless network. To address these challenges, we proposed a software-defined streaming-based code scheduling framework according to the concept of transparent computing. This framework uses the idea of code streaming...
High-speed camera can be implemented into a distributed camera network, which makes the camera network available to various dynamic applications such as observation at high speed and tracking of fast moving objects. This network system can be referred as high-speed distributed smart cameras (H-DSC). In order to construct a H-DSC, accurate synchronization between cameras as well as real-time feature...
In ubiquitous computing environment it is common that a user owns and uses multiple computing devices, but managing cryptographic keys in those devices is a complicated matter. If certificate-based cryptography (PKI) is used such that each device has independent certificate, then user has to be involved in multiple certificate issuing processes with certification authorities (CA) and has to keep multiple...
By analyzing the binary executable files comparing technique, this paper presents a method to detect vulnerabilities in Windows system based on security patch comparison. The technology is mostly used for detecting vulnerabilities which are patched by Microsoft but there is no clear location and detailed information of the vulnerabilities. Finally, the result of detecting MS15-034 vulnerability experiment...
Cloud Computing is a major field of study. Cloud Storage is regarded as an infrastructure to cloud computing and personal cloud storage are gaining popularity. This paper presents the development of a user friendly and efficient personal cloud synchronization and storage service using java and php. The application follows a new algorithm and its architecture is beyond the conventional client/server...
In recent years, programs operating on networks are increasing because of the development of distributed processing technology. Therefore, agent-oriented programming, which can respond dynamically to environmental changes, is receiving attention as a development technique. The agent framework is supports software development through agent-oriented programming. For this research, DASH is a repository...
Recently, as a robust backup, geographically dispersed and distributed backup systems to save data have been attracting attention. However, existing distributed backup systems that can be operated at low cost present various difficulties such as processing time, immediacy, and storage capacity. Therefore, as an existing method intended to solve this problem, multiagentbased distributed backup systems...
Nowadays, mobile computing is the norm of everyday life. People use mobile device such as iPhone communicate with each other by email, WhatsApp and WeChat etc., by video conference with Skype, and by eLearning with Blackboard etc. However, seldom people use mobile device to practice music, and there is not yet a standard methodology for people to do eLearning for music with a mobile device. This paper...
To deal with real-life black-box expensive multiobjective optimization problems, we investigated the application of an optimization framework expanded from MOEA/D-EGO. As MOEA/D-EGO, Gaussian process modeling techniques are used to subtittute the evaluation of the problem itself. Apart from the expected improvement (EI) in-fill rule in the original MOEA/D-EGO, we define a process that adaptively selects...
The necessity of making a system robust to the uncertainties of the different measures taken from the computing infrastructure is one of the Grid Computing research challenges. In particular, taking relevant information to tasks scheduling from a set of heterogeneous sources and dynamic behavior has been the focus of a significant number of studies. Considering this background, this paper aims to...
The paper is devoted to an analysis of a one-year-long period of operation of a honeynet composed of 6 Dionaea honeypots emulating Windows services. The analysis focused on the frequency of attacks according to the location of individual honeypots (sensors) as well as to the geographical location of attackers. From the statistical processing of the results, it was demonstrated that the most frequently...
Botnets are one of the major threats to network security. A botnet can launch attacks by stealing information, phishing sites, sending spam mail and setting up distributed denial of service (DDoS). Some botnets called Domain Generation Algorithm (DGA) Botnets apply a domain generation algorithm to avoid being detected by the traditional blacklist detection scheme. Using a domain generation algorithm,...
With the rapid development of the Internet and mobile platform technology, the network application based on P2P/P2SP is increasing, which makes the network bandwidth resources become increasingly tight. Based on the protocol analysis, this paper studies the characteristics of the typical P2P/P2SP packet, and proposes the specific recognition scheme for the application of this kind of application,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.