One seeks to develop predictive models to map between a set of predictor variables and an outcome. Statistical tools such as multiple regression or neural networks provide mature methods for computing model parameters when the set of predictive covariates and the model structure are pre-specified. Recent research is providing new tools for inferring the structural […]
Supervised Comparative Mining Method
Comparing alternative options is one essential step in decision-making that we carry out everyday. If someone is interested in certain products such as digital cameras, he or she would want to know what the alternatives are and compare different cameras before making a purchase. This type of comparison activity is very common in our daily […]
Mobile presence services for large-scale social network services
The ubiquity of the Internet, mobile devices and cloud computing environments can provide presence-enabled applications, social network applications/services, worldwide. Facebook, Twitter, Foursquare, Google Latitude, buddy cloud and Mobile Instant Messaging (MIM), are examples of presence-enabled applications that have grown rapidly in the last decade. Social network services are changing the ways in which participants engage […]
Amazon’s Cloud Formation upcoming the meta cloud for TOSCA specification
The cloud computing paradigm has achieved widespread adoption in recent years. Its success is due largely to customers’ ability to use services on demand with a pay-as-you go pricing model, which has proved convenient in many respects. Low costs and high flexibility make migrating to the cloud compelling. Despite its obvious advantages, however, many companies […]
A cloud-based driving directions service in time-dependent landmark graph
A daily activity and been implemented as a key feature in many map services like Google and Bing Maps. A fast driving route saves not only the time of a driver but also energy consumption. This service is important for both end users and governments aiming to ease traffic problems and protect environment. The time […]
Active Discovery And Imblanced Learning in Generative-Discriminative models
The vast majority of sky survey image content is due to well understood phenomena, and only 0.001% of data is of interest for astronomers to study. Computer network intrusion detection exhibits vast amounts of normal user traffic, and a very few examples of malicious attacks. In computer vision based security surveillance of public spaces, observed […]
Policy management is protect sensitive information
THE method of policy based management is widely used to manage complex and large scale network systems. The traditional framework of policy based management consists of four core components: PDP (Policy Decision Point), PEP (Policy Enforcement Point), PAP (Policy Administration Point) and PR (Policy Repository). A well-trained policy administrator or group will specify, verify policies […]
EOLSR for defense against DOS attack in the network
In this paper we analyze the vulnerabilities of a pro-active routing protocol called optimized link state routing (OLSR) against a specific type of denial-of-service (DOS) attack called node isolation attack. Analyzing the attack, we propose a mechanism called enhanced OLSR (EOLSR) protocol which is a trust based technique to secure the OLSR nodes against the […]
To detect and mitigate collaborative attacks in the cloud Virtual networking environment
NICE utilizes the attack graph model to conduct attack detection and prediction. The proposed solution investigates how to use the programmability of software switches based solutions to improve the detection accuracy and defeat victim exploitation phases of collaborative attacksCloud security is one of most important issues that has attracted a lot of research and development […]
Enhanced Adaptive ACKnowledgment to detect Secure Intrusion in for MANETs
In this paper, we propose and implement a new intrusion-detection system named Enhanced Adaptive ACKnowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious- behavior-detection rates in certain circumstances while does not greatly affect the network performances. The migration to wireless network from wired network has been a global trend in […]
- « Previous Page
- 1
- …
- 3
- 4
- 5
- 6
- Next Page »