To protect WSNs from the harmful attacks exploiting the replay of routing information, we have designed and implemented a robust trust-aware routing framework, TARF, to secure routing solutions in wireless sensor networks. The design of TARF centers on trustworthiness and energy efficiency. EnergyWatcher is responsible for recording the energy cost for each known neighbor, based […]
Dynamic Load balancing with Access Point Selection Algorithm
Abstract Maximizing network throughput while providing fairness is one of the key challenges in wireless LANs (WLANs). This goal is typically achieved when the load of access points (APs) is balanced. In this article, we study this AP selection problem in a decentralized manner with the objective of maximizing the minimum throughput among all […]
Dynamic Data Operation and Secure access control in cloud computing
The many advantages of cloud computing are increasingly attracting individuals and organizations to outsource their data from local to remote cloud servers. However, security and privacy concerns have arisen as obstacles to widespread adoption of clouds by users. While much cloud security research focuses on enforcing standard access control policies typical of centralized systems, such […]
Detecting and preventing a selfishness in Mobile Ad Hoc Network
A mobile ad-hoc network (MANET) is the collection of mobile nodes that are equipped by several wireless mobile devices which are using for communication. In MANET, most of the Replica allocation techniques are assuming that all mobile nodes cooperate fully in the network functionalities. Some nodes decide not to cooperate partially or fully. Network performance […]
Selfish node detection in MANET
In this paper, we address the problem of selfishness in the context of replica allocation in a MANET, i.e., a selfish node may not share its own memory space to store replica for the benefit of other nodes. In this paper, we shall refer to such a problem as the selfish replica allocation. Simply, selfish […]
Co-distribution patterns Mining for Maximum crime datasets
Crime activities are geospatial phenomena and as such are geospatially, thematically and temporally correlated. We analyze crime datasets in conjunction with socio-economic and socio-demographic factors to discover co-distribution patterns that may contribute to the formulation of crime. We propose a graph based dataset representation that allows us to extract patterns from heterogeneous areal aggregated datasets […]
Class-dependent density-based feature Elimination
High-dimensional data sets are inherently sparse and hence, can be transformed to lower dimensions without losing too much information about the classes. In this paper we propose a new feature ranking algorithm, termed as, class-dependent density-based feature elimination, for binary data sets. CDFE uses a measure termed as, diff-criterion, to estimate the relevance of features. […]
MLT-PPDM: Multi-Level Trust in Privacy Preserving Data Mining
In this paper, we address this challenge in enabling MLT-PPDM services. In particular, we focus on the additive perturbation approach where random Gaussian noise is added to the original data with arbitrary distribution, and provide a systematic solution. Through a one-to-one mapping, our solution allows a data owner to generate distinctly perturbed copies of its […]
Community anomaly detection system
Collaborative information systems (CISs) allow groups of users to communicate and cooperate over common tasks. CIS are increasingly relied upon to manage sensitive information. In this paper, we introduce a framework to detect anomalous insiders from the access logs of a CIS by leveraging the relational nature of system users as well as the meta-information […]
Multi Cloud: Cloud Computing Security
Single cloud provider is becoming less popular with customers due to potential problems such as service availability failure and the possibility that there are malicious insiders in the single cloud. In recent years, there has been a move towards “multiclouds”, “intercloud” or “cloud-of-clouds”. This paper focuses on the issues related to the data security aspect […]
- 1
- 2
- 3
- …
- 6
- Next Page »