DDoS presents a serious threat to the Internet since its inception, where lots of controlled hosts flood the victim site with massive packets. Moreover, in Distributed Reflection DoS (DRDoS), attackers fool innocent servers (reflectors) into flushing packets to the victim. But most of current DRDoS detection mechanisms are associated with specific protocols and cannot be […]
Secure Multi-Party algorithm for Mining of Association Rule in Databases
We propose a protocol for secure mining of association rules in horizontally distributed databases. The current leading protocol is that of Kantarcioglu and Clifton . The main ingredients in our protocol are two novel secure multi-party algorithms — one that computes the union of private subsets that each of the interacting players hold, and another […]
Preserving m-privacy to Anonymize a horizontally distributed Dataset
In this paper the m-privacy verification algorithms and protocols, we can use it to anonymize a horizontally distributed dataset while preserving m-privacyFirst, we introduce the notion of m-privacy, which guarantees that the anonymized data satisfies a given privacy constraint against any group of up to m colluding data providers. Second, we present heuristic algorithms exploiting […]
Multimedia Search With Pseudo Revelance Feedback
Search reranking is regarded as a common way to boost retrieval precision. The problem nevertheless is not trivial especially when there are multiple features or modalities to be considered for search, which often happens in image and video retrieval. This paper proposes a new reranking algorithm , named circular reranking, that reinforces the mutual exchange of information across […]
Implementing Effective Controls in a Mobile, Agile, Cloud-Enabled Enterprise
security teams that call for security to be “everyone’s responsibility” and “built in, not bolted on” are struggling to protect their businesses in the face of consumerization, mobility, cloud, and agile business environments. This article offers tangible techniques to turn these clichés into reality while considering the cultural and trust barriers that hinder the implementation […]
- « Previous Page
- 1
- …
- 4
- 5
- 6