We present a class of Minimum Cost Blocking (MCB) problems in Wireless Mesh Networks (WMNs) with multi-path wireless routing protocols. We establish the provable superiority of multi-path routing protocols over conventional protocols against blocking, node-isolation and network-partitioning type attacks. In our attack model, an adversary is considered successful if he is able to capture/isolate a […]
Combined and Differentiated Localization approach for localization using received signal strength indicator (RSSI)
In this paper, we propose CDL, a Combined and Differentiated Localization approach for localization that exploits the strength of range-free approaches and range-based approaches using received signal strength indicator (RSSI). A critical observation is that ranging quality greatly impacts the overall localization accuracy. To achieve a better ranging quality, our method CDL incorporates virtual-hop localization, […]
SECURE COVERAGE OF LARGE SCALE WIRELESS SENSOR NETWORK
We proposed, in this work, a scalable key management scheme which ensures a good secure coverage of large scale WSN with a low key storage overhead and a good network resiliency.One of the main concerns when designing a key management scheme is the network scalability. Indeed, the protocol should support a large number of nodes […]
To detect and mitigate collaborative attacks in the cloud Virtual networking environment
NICE utilizes the attack graph model to conduct attack detection and prediction. The proposed solution investigates how to use the programmability of software switches based solutions to improve the detection accuracy and defeat victim exploitation phases of collaborative attacksCloud security is one of most important issues that has attracted a lot of research and development […]
Enhanced Adaptive ACKnowledgment to detect Secure Intrusion in for MANETs
In this paper, we propose and implement a new intrusion-detection system named Enhanced Adaptive ACKnowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious- behavior-detection rates in certain circumstances while does not greatly affect the network performances. The migration to wireless network from wired network has been a global trend in […]
ONLINE SOCIAL NETWORK USER CONTROL OVER THE UNWANTED MESSAGE
In this paper, we have presented a system to filter undesired messages from OSN walls .One fundamental issue in today’s Online Social Networks (OSNs) is to give users the ability to control the messages posted on their own private space to avoid that unwanted content is displayed. Up to now, OSNs provide little support to […]
Real-time nature of Twitter for event detection
Twitter has received much attention recently. In this paper, we investigated the real-time nature of Twitter, devoting particular attention to event detection. An important characteristic of Twitter is its real-time nature. We investigate the real-time interaction of events such as earthquakes in Twitter and propose an algorithm to monitor tweets and to detect a target […]
A Rank Correlation Based Detection against Distributed Reflection DoS Attacks
DDoS presents a serious threat to the Internet since its inception, where lots of controlled hosts flood the victim site with massive packets. Moreover, in Distributed Reflection DoS (DRDoS), attackers fool innocent servers (reflectors) into flushing packets to the victim. But most of current DRDoS detection mechanisms are associated with specific protocols and cannot be […]
Design and development of trusted Database with full data confidentiality
Traditionally, as soon as confidentiality becomes a concern, data is encrypted before outsourcing to a service provider. Any software-based cryptographic constructs then deployed, for server-side query processing on the encrypted data, inherently limit query expressiveness. Here, we introduce TrustedDB, an outsourced database prototype that allows clients to execute SQL queries with privacy and under regulatory […]
A Fast Clustering-Based Feature Subset Selection Algorithm for High-Dimensional Data
Feature selection involves identifying a subset of the most useful features that produces compatible results as the original entire set of features. A feature selection algorithm may be evaluated from both the efficiency and effectiveness points of view. While the efficiency concerns the time required to find a subset of features, the effectiveness is related […]
- « Previous Page
- 1
- …
- 5
- 6
- 7
- 8
- 9
- Next Page »