Given a geographic query that is composed of query keywords and a location, a geographic search engine retrieves documents that are the most textually and spatially relevant to the query keywords and the location, respectively, and ranks the retrieved documents according to their joint textual and spatial relevance to the query. The lack of an […]
Cosdes: A Collaborative Spam Detection System with a Novel
E-mail communication is indispensable nowadays, but the e-mail spam problem continues growing drastically. In recent years, the notion of collaborative spam filtering with near-duplicate similarity matching scheme has been widely discussed. The primary idea of the similarity matching scheme for spam detection is to maintain a known spam database, formed by user feedback, to block […]
Anonymous Publication of Sensitive Transactional Data
Existing research on privacy-preserving data publishing focuses on relational data: in this context, the objective is to enforce privacy-preserving paradigms, such as k-anonymity and ‘-diversity, while minimizing the information loss incurred in the anonymizing process (i.e., maximize data utility). Existing techniques work well for fixed-schema data, with low dimensionality. Nevertheless, certain applications require privacy-preserving publishing […]
Integrating Web Content Clustering into Web Log Association Rule Mining
One of the effects of the general Internet growth is an immense number of user accesses to WWW resources. These accesses are recorded in the web server log files, which are a rich data resource for finding useful patterns and rules of user browsing behavior, and they caused the rise of technologies for Web usage […]
Visual Zero-Knowledge Proof of Identity Scheme: A New Approach
A zero-knowledge proof of identity protocol is a special cryptographic algorithm for identity verification. The security of most of the zero-knowledge proof of identity protocols is based on complex mathematical algorithms and requires heavy computations for both parties involved, the proverb and the verifier. Thus, the two parties must depend on computing devices (computers) to […]
Storing and Indexing Spatial Data in P2P Systems
The peer-to-peer (P2P) paradigm has become very popular for storing and sharing information in a totally decentralized manner. At first, research focused on P2P systems that host 1D data. Nowadays, the need for P2P applications with multidimensional data has emerged, motivating research on P2P systems that manage such data. The majority of the proposed techniques […]
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study data delivery mechanisms that can with high probability circumvent black holes formed by these attacks. We argue that classic multipath routing approaches are vulnerable to such attacks, mainly due to their deterministic nature. So once the adversary acquires […]
Reputation-Based Resource Allocation in P2P Systems of Rational Users
In this paper, we study p2p systems, where peers have to share their available resources between their own and other peers’ needs. One such example is a system of peers who use their capacity-limited access links both for their upstream and downstream connections. In the selfish approach, each peer would like to exploit the full […]
Proxy Signature Scheme Secure against Chosen Key and Chosen Warrant Attacks
An enhanced security model for proxy signature schemes is formalized. In the new model, we consider chosen key and chosen warrant attacks which exist in real environment but were neglected in previous security models. Then we propose a proxy signature scheme from bilinear maps. The proposed proxy signature scheme is based on a secure signature […]
Layered Approach Using Conditional Random Fields for Intrusion Detection
Intrusion detection faces a number of challenges; an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. In this paper, we address these two issues of Accuracy and Efficiency using Conditional Random Fields and Layered Approach. We demonstrate that high […]
- « Previous Page
- 1
- …
- 7
- 8
- 9
- 10
- 11
- 12
- Next Page »