By measuring similarity of programs, we can determine whether someone illegally copies a program from another program or not. If the similarity is significantly high, it means that a program is a copy of the other. Th...
详细信息
Awareness mechanisms are normally used to deliver context information to computer systems users. These mechanisms have been extensively studied as part of collaborative solutions designed for stationary scenarios, and...
详细信息
Network security can be analysed using attack representation models (ARMs) (e.g., Attack Graphs (AGs) and Attack Trees (ATs)). One can analyse the network security by computing all possible attack scenarios, but it su...
详细信息
ISBN:
(纸本)9781479901807
Network security can be analysed using attack representation models (ARMs) (e.g., Attack Graphs (AGs) and Attack Trees (ATs)). One can analyse the network security by computing all possible attack scenarios, but it suffers from a scalability problem. We propose centrality based network security analysis by ranking important hosts based on network centrality measures, and vulnerabilities based on security metric values. We used two-layer hierarchical attack representation model to evaluate the network security, by taking into account importance of hosts and vulnerabilities in the upper and the lower layers, respectively. We define a new centrality measure based on the location of an attacker and a target. We simulate security analysis using centrality measures comparing with an exhaustive search method. Further, we investigate the performance when the location of the attacker is different in the network.
Can one estimate the number of remaining faults in a software system? A credible estimation technique would be immensely useful to project managers as well as customers. It would also be of theoretical interest, as a ...
详细信息
ISBN:
(纸本)9781450316569
Can one estimate the number of remaining faults in a software system? A credible estimation technique would be immensely useful to project managers as well as customers. It would also be of theoretical interest, as a general law of softwareengineering. We investigate possible answers in the context of automated random testing, a method that is increasingly accepted as an effective way to discover faults. Our experimental results, derived from best-fit analysis of a variety of mathematical functions, based on a large number of automated tests of library code equipped with automated oracles in the form of contracts, suggest a poly-logarithmic law. Although further confirmation remains necessary on different code bases and testing techniques, we argue that understanding the laws of testing may bring significant benefits for estimating the number of detectable faults and comparing different projects and practices. Copyright 2013 ACM.
In this paper a novel localization technique is proposed using fuzzy logic and genetic algorithm to get nearly precise location of sensor nodes, in a range free localization system. This localization technique gives a...
详细信息
ISBN:
(纸本)9781467361248
In this paper a novel localization technique is proposed using fuzzy logic and genetic algorithm to get nearly precise location of sensor nodes, in a range free localization system. This localization technique gives a stable system in which both magnitude and range of the error are very low. Various membership functions (MF) are tested among which the Sinc MF provides the best results for the system. Genetic algorithm is used to optimize the knowledge base of the fuzzy system and the simulations are done employing Mamdani fuzzy interference method. A thorough analysis compares the accuracy of the proposed system to that of the basic Centroid localization methods. Error analysis is shown using violin plot i.e. a combination of box plot and kernel density plot for the validation of the proposed model.
Modern society habitually uses online social media services to publicly share observations, thoughts, opinions, and beliefs at any time and from any location. These geotagged social media posts may provide aggregate i...
详细信息
Human Mobility Models (HMMs) have become increasingly relevant in different application domains including networks designed for data dissemination protocols. Most existing HMMs consider the temporal and spatial featur...
详细信息
The increasing availability of large-scale trajectory data provides us great opportunity to explore them for knowledge discovery in transportation systems using advanced data mining techniques. Nowadays, large number ...
详细信息
Automated construction methods of attack graphs (AGs) and their improved attack representation models (ARMs) have been proposed, but the AG has a state space explosion when analysing the security of very large sized n...
详细信息
Automated construction methods of attack graphs (AGs) and their improved attack representation models (ARMs) have been proposed, but the AG has a state space explosion when analysing the security of very large sized networked systems. Instead, attack trees (ATs) and their improved ARMs can be used (e.g., Defense Trees, Protection Trees, Attack Response Trees, and Attack Countermeasure Trees), because they are a non-state-space model. However, there are no known methods to construct ATs in a scalable manner automatically while maintaining all possible attack scenarios. We can use an AG generation tools, and transform the AG into the AT using min-cuts. However, this method requires a transformation (i.e., an overhead), and computing min-cuts is a NP-hard problem. Another way is to construct ATs directly with given network information. A naive approach is to compute all possible attack paths and populate the AT branches using logic gates (e.g., AND and OR gates), but this method generates an exponential number of nodes, causing a scalability problem. We propose two logic reduction techniques to automate the ATs construction and to reduce the size of the AT. The computational complexity is calculated. The simulation result shows the construction time for the naive method and two logic reduction techniques. The trade-off between the construction time and the memory usage of simplified ATs are also shown.
There are various factors involved in the transmission of video over internet. These factors have direct impact on the quality of the transmitted video. The underlying video codec, encapsulation method and protocol ar...
详细信息
There are various factors involved in the transmission of video over internet. These factors have direct impact on the quality of the transmitted video. The underlying video codec, encapsulation method and protocol are the key players which affect the quality of video transmission on a network. Up to our knowledge various research studies have been carried out to analyze the impact of these factors independently on the quality of video transmission however their combined effect on video transmission is not yet done. In this paper we characterize the impact of video codec, encapsulation methods and transmission protocols of video streaming setup, while keeping in view the percent frame loss as the main investigating parameter. The results obtained from the experiments carried out for the key investigating factor are presented in the results section of this paper. To be more precise, it was observed that the wmv1 mpeg2, m-jpeg codecs, asf encapsulation and rtp protocol performs best.
暂无评论