Technical evolution of location technologies has augmented the development and growth of location-based services. With widespread adoption of these services, threats to location privacy are increasing, entailing more ...
详细信息
Technical evolution of location technologies has augmented the development and growth of location-based services. With widespread adoption of these services, threats to location privacy are increasing, entailing more robust and sophisticated solutions. This paper proposes an intuitive obfuscation-based scheme, which uses vagueness in human perception of nearness to provide a flexible and robust location privacy scheme. Key to this work is the concept of vagueness degree, which aims to enhance its robustness against privacy attacks. Furthermore, our scheme is totally in line with human perception of privacy and provides a solution, which mostly suits proximity-based services, social networking environments, and other similar applications. The solution is also applicable to various environments ranging from geographical locations to IP-based and mobile networks. We propose three privacy-aware architectures for our scheme. In addition, it is shown that the time and space complexity of the scheme is polynomial. The robustness of the scheme against privacy attacks as well as its implementation issues are discussed.
This article proposed that Web-Based Instruction (WBI) diffusion in colleges and universities was an innovation. Under the guidance of Diffusion of Innovation theory, the article described the WBI diffusion and adopti...
详细信息
This article proposed that Web-Based Instruction (WBI) diffusion in colleges and universities was an innovation. Under the guidance of Diffusion of Innovation theory, the article described the WBI diffusion and adoption model as “five stages and four levels”. This model proposed the different diffusion strategies which adopted in view of the innovation acceptance. Then, the diffusion effect through the four adoption levels was analyzed. Potential development of the use of WBI, as well as its implication on how to encourage more faculty members to adopt WBI was investigated finally.
Most network attack models have the problem of lacking ablility to describe all types of attack patterns in deltail, with no consideration of attacker's skill and policy. To address the problem, this paper pro...
详细信息
Most network attack models have the problem of lacking ablility to describe all types of attack patterns in deltail, with no consideration of attacker's skill and policy. To address the problem, this paper proposes a well-structured model that abstracts the relation between attacker capability and victim vulnerability, the relation between knowledge, resource and capability of attacker. Both these two relations can be used to support automatic correlating of vulnerability exploits to build all the attack paths from the attacker to the target. The basic block of the model is a logical formula called capability, which is used to abstract consistently and precisely all levels of accesses obtained by the attacker in each step of a multistage attack A flexible extensible language based on Pyke is developed to specify the model and derive inference rules to define logical relations between different capabilities, and a demonstration is given to show how it can be used in security applications such as vulnerability analysis and attack generation.
This paper proposes BotDigger, a fuzzy logic-based botnet detection system. In this system, we derive a set of logical rules based on a well known botnet characteristics. Utilizing these rules, an adaptive logic algor...
详细信息
This paper proposes BotDigger, a fuzzy logic-based botnet detection system. In this system, we derive a set of logical rules based on a well known botnet characteristics. Utilizing these rules, an adaptive logic algorithm will be applied on network traffic traces searching for botnet footprints and associating a trust level for each host present in the sampled data. Future work will focus on evaluating the proposed approach using real traffic traces.
Nonlinear effects in actively mode-locked fiber lasers are presented. A laser model including a gain media, a band pass filter, optical fiber and an intensity modulator is introduced to investigate the performance of ...
详细信息
Nonlinear effects in actively mode-locked fiber lasers are presented. A laser model including a gain media, a band pass filter, optical fiber and an intensity modulator is introduced to investigate the performance of the laser under nonlinear effects. Lasers in both working conditions, non-detuning and detuning, are studied. We find that the nonlinear effects compress the pulse through the self phase modulation (SPM) effect. However, there is a trade of between pulse shortening and large detuning range. Laser with shorter pulse has narrower detuning range and vise versa.
In this paper, we propose several strategies for communication scheduling that can help increase the speed of parallel data mining algorithm. The proposed method based on the smart scheduling that enable parallel data...
详细信息
ISBN:
(纸本)9781424456062;9789746724913
In this paper, we propose several strategies for communication scheduling that can help increase the speed of parallel data mining algorithm. The proposed method based on the smart scheduling that enable parallel data mining application to fully utilize the interconnection infrastructure for communication. We compare the proposed strategies with a non communication scheduling algorithm on 2 to 32 cores multicore cluster systems using simulation. The experimental results show that a significantly performance improvement can be gained when a smart communication scheduling is included in the data mining algorithm.
Data center facilitates the e-governance system. Data center is a huge repository of data that is required by every stakeholders of e-governance system. It consists of many sensitive governments' data. Access of t...
详细信息
ISBN:
(纸本)9781424454273;9788955191455
Data center facilitates the e-governance system. Data center is a huge repository of data that is required by every stakeholders of e-governance system. It consists of many sensitive governments' data. Access of these data by every authorized stakeholder is one of the mandatory features of data center. At the same time, it has many challenges like the cost, management and updating it and also encounters with many threats from intruders. Providing reliable data to its users in terms of services in low cost is the main objectives of data center. This paper tries to address the challenges with the concept of cloud computing. We discuss the features of cloud computing and its use in data center in this paper.
In this paper we consider estimating the spatial variations of a wireless channel based on a small number of measurements in a robotic network. We use a multi-scale probabilistic model in order to characterize the cha...
详细信息
In this paper we consider estimating the spatial variations of a wireless channel based on a small number of measurements in a robotic network. We use a multi-scale probabilistic model in order to characterize the channel and develop an estimator based on this model. We show that our model-based approach can estimate the channel well for several scenarios, with only a small number of gathered measurements. We furthermore consider a sparsity-based channel estimation approach, in which we utilize the compressibility of the channel in the frequency domain. Our results show that this approach can also be effective in several scenarios. We then discuss the underlying tradeoffs between the two approaches. For the model-based approach, we show the impact of the error in the underlying model as well as the error in the estimation of the parameters of the model on the overall performance. For the sparsity-based approach, we show the impact of channel compressibility on the performance. Overall, the proposed framework can be utilized for communication-aware motion planning in robotic networks, where a prediction of the link qualities is needed.
Fair Multi-Party Certified Mail Protocol is a value service to deliver important data over internet with guaranteed receipt for each successful delivery. Therefore, the protocol needs to be Confidential, Non-repudiati...
详细信息
To find an optimal elimination ordering for Bayesian networks, a multi-heuristic-based ant colony system named MHC-HS-ACS is proposed. MHC-HS-ACS uses a set of heuristics to guide the ants to search solutions. The heu...
详细信息
暂无评论