Braess's paradox states that removing a part of a network may improve the players' latency at equilibrium. In this work, we study the approximability of the best subnetwork problem for the class of random Gn,p...
详细信息
network audit trails, especially those composed of application layer data, can be a valuable source of information regarding the investigation of attack incidents. Nevertheless, the analysis of log files of large volu...
详细信息
This paper describes traces of user activity around a alleged online social network profile of a Boston Marathon bombing suspect, after the tragedy occurred. The analyzed data, collected with the help of an automatic ...
详细信息
ISBN:
(纸本)9781479914975
This paper describes traces of user activity around a alleged online social network profile of a Boston Marathon bombing suspect, after the tragedy occurred. The analyzed data, collected with the help of an automatic social media monitoring software, includes the perpetrator's page saved at the time the bombing suspects' names were made public, and the subsequently appearing comments left on that page by other users. The analyses suggest that a timely protection of online media records of a criminal could help prevent a large-scale public spread of communication exchange pertaining to the suspects/criminals' ideas, messages, and connections.
Long Term Evolution (LTE) is a promising technology for mobile communication. This technology is based on reducing the base stations cell size, which will lead to an increment in the number of base stations. As a resu...
详细信息
Long Term Evolution (LTE) is a promising technology for mobile communication. This technology is based on reducing the base stations cell size, which will lead to an increment in the number of base stations. As a result, energy consumption will increase. Therefore, there is a need to optimize the LTE base stations transmission power and location to comply with the green technology. In this paper, a Genetic Algorithm (GA) optimization technique is proposed to estimate the best locations for LTE base stations, the optimum number of base stations to be used and the minimum transmission power needed for a given scenario. The proposed system is applied in Kuala Lumpur, Malaysia.
In recent years, with the rapid growth of the Internet applications and services, phishing attacks seriously threaten the web security. Due to the versatile and dynamic nature of phishing patterns, the development and...
详细信息
In recent years, with the rapid growth of the Internet applications and services, phishing attacks seriously threaten the web security. Due to the versatile and dynamic nature of phishing patterns, the development and maintenance of the anti-phishing prevention system is difficult and costly. Hence, how to acquire and update the phishing knowledge and the phishing model in the anti-phishing detection system become an important issue. In this study, we use the EMCUD (Extended Embedded Meaning Capturing and Uncertainty Deciding) method to build up the phishing attack knowledge according to the identification of phishing attributes. Since users have been aware of some anti-phishing methods, phishers often evolve phishing attack to gain in the environment. The phishing attack knowledge also needs to be dynamically evolved over time. How to systematically evolve the phishing knowledge becomes a major concern of this study. Hence, we use the VODKA (Variant Objects Discovering Knowledge Acquisition) method, a dynamic EMCUD, to evolve existing phishing knowledge. These methods can facilitate the acquisition of new inference rules for the phishing attack knowledge and the observation of the variation and the trend of the phishing attack. In the experiment, 1, 762 phishing URL of the APNOW (Anti-Phishing Notification Window) phishing database of Taiwan have been partitioned into 7 representative phishing cases, and 10 phishing attributes have been obtained by the VOKDA method. Finally, we successfully evolve detection rules of phishing models and observe the trend of the phishing attack model to show the feasibility of this study.
In recent years, the multiple-input-multiple-output (MIMO), the orthogonal frequency division multiplexing (OFDM), and the relay communication techniques have significantly improved the important performance of radio ...
详细信息
ISBN:
(纸本)9781479913510
In recent years, the multiple-input-multiple-output (MIMO), the orthogonal frequency division multiplexing (OFDM), and the relay communication techniques have significantly improved the important performance of radio wireless communication networks. Due to its wide and critical applications, we can also apply these techniques into the underwater acoustic (UWA) wireless networks. In this paper, we propose the power-efficiency resource allocation scheme for tradeoff between the power consumption and quality of service (QoS) of multimedia applications in a relay-based underwater MIMO-OFDM acoustic cooperative wireless networks. Our objective is to efficiently minimize the total power/energy consumption while supporting the QoS-guaranteed services for multimedia applications over underwater MIMO-OFDM acoustic cooperative wireless networks. To achieve these goals, we propose a joint optimization of source and relay network transmit power with the QoS-constraint for the relay-based MIMO-OFDM underwater acoustic cooperative wireless networks. We conduct the extensive simulations to validate and evaluate our proposed scheme, showing its superiority over the other existing schemes.
This paper considers cases where a specific number of nodes in an ad hoc network broadcast video and audio streams over the entire network. For the purpose, we have proposed Load and Battery Charge oriented Flooding (...
详细信息
The effectiveness of CAPTCHA challenges largely depends on being simultaneously easier to solve for humans and harder to solve for bots. In this work we argue that it is possible to enhance the effectiveness of audio ...
详细信息
Wireless mesh networks is a new type of broadband access network. It has very typical network architecture of hybrid mesh network architecture. As wireless mesh network with distributed network architecture, it is rel...
详细信息
More and more people are using mobile equipments to access business resources from the organization's internal network, how to ensure the data security in the data transport process of mobile intelligent terminals...
详细信息
暂无评论