Given a geographic query that is composed of query keywords and a location, a geographic search engine retrieves documents that are the most textually and spatially relevant to the query keywords and the location, respectively, and ranks the retrieved documents according to their joint textual and spatial relevance to the query. The lack of an […]
Cosdes: A Collaborative Spam Detection System with a Novel
E-mail communication is indispensable nowadays, but the e-mail spam problem continues growing drastically. In recent years, the notion of collaborative spam filtering with near-duplicate similarity matching scheme has been widely discussed. The primary idea of the similarity matching scheme for spam detection is to maintain a known spam database, formed by user feedback, to block […]
Anonymous Publication of Sensitive Transactional Data
Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ‘-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing […]
Integrating Web Content Clustering into Web Log Association Rule Mining
One of the effects of the general Internet growth is an immense number of user accesses to WWW resources. These accesses are recorded in the web server log files, which are a rich data resource for finding useful patterns and rules of user browsing behavior, and they caused the rise of technologies for Web usage […]
Visual Zero-Knowledge Proof of Identity Scheme: A New Approach
A zero-knowledge proof of identity protocol is a special cryptographic algorithm for identity verification. The security of most of the zero-knowledge proof of identity protocols is based on complex mathematical algorithms and requires heavy computations for both parties involved, the proverb and the verifier. Thus, the two parties must depend on computing devices (computers) to […]
Proxy Signature Scheme Secure against Chosen Key and Chosen Warrant Attacks
An enhanced security model for proxy signature schemes is formalized. In the new model, we consider chosen key and chosen warrant attacks which exist in real environment but were neglected in previous security models. Then we propose a proxy signature scheme from bilinear maps. The proposed proxy signature scheme is based on a secure signature […]
Layered Approach Using Conditional Random Fields for Intrusion Detection
Intrusion detection faces a number of challenges; an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. In this paper, we address these two issues of Accuracy and Efficiency using Conditional Random Fields and Layered Approach. We demonstrate that high […]
IRM: Integrated File Replication and Consistency Maintenance in P2P Systems
In peer-to-peer file sharing systems, file replication and consistency maintenance are widely used techniques for high system performance. Despite significant interdependencies between them, these two issues are typically addressed separately. Most file replication methods rigidly specify replica nodes, leading to low replica utilization, unnecessary replicas and hence extra consistency maintenance overhead. Most consistency maintenance methods […]
Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks
In wireless sensor networks, compromised sensor nodes can inject false data during both data aggregation and data forwarding. The existing false data detection techniques consider false data injections during data forwarding only and do not allow any change on the data by data aggregation. However, this paper presents a data aggregation and authentication protocol, called […]
Image Copy-Move Forgery Detection Based on SURF
As the advent and growing popularity of image editing software, digital images can be manipulated easily without leaving obvious visual clues. If the tampered images are abused, it may lead to potential social, legal or private consequences. To this end, it’s very necessary and also challenging to find effective methods to detect digital image forgeries. […]
- « Previous Page
- 1
- …
- 7
- 8
- 9
- 10
- 11
- Next Page »