The methods for selecting the countermeasures for a given attack scenario. When vulnerabilities are discovered or some VMs are identified as suspicious, several countermeasures can be taken to restrict attackers’ capabilities and it’s important to differentiate between compromised and suspicious VMs. The countermeasure serves the purpose of 1) protecting the target VMs from being compromised; […]
HIGEN MINER Algorithm Pseudocode
Frequent itemset mining has been first proposed in, in the context of market basket analysis, as the first step of the association rule extraction process. The problem of discovering relevant changes in the history of itemsets and association rules has been already addressed by a number of research papers ,Active data mining was the first […]
SOCIAL NETWORK ANALYSIS BASED MOBILE NODE GROUPING
The sporadically deployed BSs/APs to the mobile nodes. To reduce the delay of packet delivery to a mobile node which is out of the transmission range of a BS (e.g., connectivity lost due to high mobility), a cooperative packet delivery scheme based on carry-and forward mechanism is used . For such applications, are provided through […]
The few approaches concerned with goal operationalization are the NFR framework
It is concerned with the elicitation of stake-holders goals, the elaboration of these goals into requirements on the software behavior, and the assignment of responsibilities for these requirements to agents . Inadequacy in the execution of any of these RE subtasks inevitably leads to development problems which are often difficult and costly to repair. This […]
Ontology- Language based in multi -facet (OMF) framework
The last decade, there has been tremendous growth in the field of network. The information served to the internet users through web is enormous. Some information provided is of use to the end users, and others of no use to them. Current web information gathering systems attempt to satisfy user requirements by capturing their information […]
The efficient minimum-spanning tree clustering Algorithm method
The aim of choosing a subset of good features with respect to the target concepts, feature subset selection is an effective way for reducing dimensionality, removing irrelevant data, increasing learning accuracy, and improving result comprehensibility. Many feature subset selection methods have been proposed and studied for machine learning applications. They can be divided into four […]
Tweets Monitored to detect a target event of social sensor in location estimation
Twitter, a popular microblogging service, has received much attention recently. This online social network is used by millions of people around the world to remain socially connected to their friends, family members, and coworkers through their computers and mobile phones. Twitter asks one question, “What’s happening?” Answers must be fewer than 140 characters. A status […]
Idealized security requirements: impersonation, collusion, and privacy breaching
The conventional model of social networks, users select their contacts from a set of off-line acquaintances. Despite their utility, these conventional networks support only a subset of social networking: two users will only be able to establish a relationship in the social network if they , or are introduced to each other. One more Encounter […]
CF-based web service recommender systems and QoS space visualization
Web services are software components designed to support interoperable machine-to-machine interaction over a network. The adoption of web services as a delivery mode in business has fostered a new paradigm shift from the development of monolithic applications to the dynamic setup of business process. The number of public web services is steadily increasing. Implementing service-oriented […]
Delay comparison between ICMP probing and HTTP/Get probing
The applications will benefit from or be enabled by knowing the geographical locations or geolocations, of Internet hosts. Such locality-aware applications include local weather forecast, the choice of language to display on web pages, targeted advertisement, page hit account in different places, restricted content delivery according to local policies, etc. Locality-aware peer selection will also […]