A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
R-IDPS: Real Time SDN-Based IDPS System for IoT Security
2022
Computers Materials & Continua
There has been a lot of research for IoT based detection systems to secure the IoT devices such as centralized and distributed architecture-based detection systems. ...
The R-IDPS is scalable, and the system is suitable for heterogeneous IoT devices and networks. ...
This database serves as a repository for real-time network flows, that helps in mining the device features based on its network flows. ...
doi:10.32604/cmc.2022.028285
fatcat:a6njdvakc5b3viqhi4vdl3gwnm
A collaborative framework for intrusion detection (C-NIDS) in Cloud computing
2016
2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech)
In our NIDS framework, we use Snort as a signature based detection to detect known attacks, while for detecting network anomaly; we use Support Vector Machine (SVM). ...
In recent years, Cloud computing has emerged as a new paradigm for delivering highly scalable and on-demand shared pool IT resources such as networks, servers, storage, applications and services through ...
Cl-CIDPS uses both techniques viz; signature based detection and anomaly detection in a network based IDPS, distributed in different cloud regions. ...
doi:10.1109/cloudtech.2016.7847708
fatcat:ppx3j7pbabfcrd2snoyfvvxuha
A Cloud Storage overlay to aggregate heterogeneous Cloud services
2013
38th Annual IEEE Conference on Local Computer Networks
This paper proposes PiCsMu (Platform-independent Cloud Storage System for Multiple Usage), a novel approach exploiting heterogeneous data storage of different Cloud services by building a Cloud storage ...
As opposed to P2P file sharing, where data and indices are stored on peers, PiCsMu uses Cloud storage systems for data storage, while maintaining a distributed index. ...
, an Initialization Vector (IV), and a password. ...
doi:10.1109/lcn.2013.6761296
dblp:conf/lcn/MachadoBAS13
fatcat:isfwvhi37rblfh75ny3tw3fgky
Privacy Preserving Policy-Based Content Sharing in Public Clouds
2013
IEEE Transactions on Knowledge and Data Engineering
Using our BGKM construct, we propose an efficient approach for fine-grained encryption based access control for documents stored in an untrusted cloud file storage. ...
Based on this idea, we formalize a new key management scheme called broadcast group key management (BGKM) and then give a secure construction of a BGKM scheme called ACV-BGKM. ...
, our scheme for policy based content sharing in the cloud involves four main en tities: the Data Owner (Owner), the Users (Usrs) , the Identity Providers (IdPs), and the Cloud Storage Service (Cloud ...
doi:10.1109/tkde.2012.180
fatcat:vqnyiyhqezcbnetf34dmexec64
Constellation: A High Performance Geo-Distributed Middlebox Framework
[article]
2020
arXiv
pre-print
We introduce Constellation, a framework for the geo distributed deployment of middleboxes. ...
The evaluation of our implementation shows that, compared with the state-of-the-art [80], Constellation improves the throughput by a factor of 96 in wide area networks. ...
Database replication protocols: Two phase commit is a common protocol to replicate transactions in distributed databases. ...
arXiv:2003.05111v1
fatcat:k7enkwwn2zffdmtaz3hbhjx7oe
DECISION SUPPORT SYSTEM FOR OPTIMIZATION OF RES GENERATORS PLACEMENT BASED ON GEOSPATIAL DATA
2020
NEWS of National Academy of Sciences of the Republic of Kazakhstan
Although DP can perform any tasks, three categories of data processors can be distinguished: Import data processors (IDP). ...
The main functionality of MIGIS is implemented using data processors (DP), the number of which is highly scalable. ...
Ақпараттық жəне телекоммуникациялық технологиялар институты; 3 Мəскеу мемлекеттік университеті, Мəскеу, Ресей; 4 ISMA University, Riga, Latvia; 5 Ventspils University of Applied Sciences, Ventspils, ...
doi:10.32014/2020.2518-170x.10
fatcat:enehac7cpnctxlpatx7ikphc7a
Automated Generation of Custom Processor Core from C Code
2012
Journal of Electrical and Computer Engineering
We present a method for construction of application-specific processor cores from a given C code. Our approach consists of three phases. ...
Each processor core was constructed and refined in under a minute, allowing the designer to explore several different configurations in much less time than needed for manual design. ...
The Tensilica XPRES (Xtensa PRocessor Extension Synthesis) Compiler [15] automatically generates extensions that are formed from the existing instructions in style of VLIW, vector, fused operations, ...
doi:10.1155/2012/862469
fatcat:3w6lbl6t5retbdc7vtm2v6u52m
REVAMP2T: Real-time Edge Video Analytics for Multi-camera Privacy-aware Pedestrian Tracking
2019
IEEE Internet of Things Journal
For the results and evaluation, this article also proposes a new metric, Accuracy·Efficiency (Æ), for holistic evaluation of IoT systems for real-time video analytics based on accuracy, performance, and ...
At the same time, it avoids facial recognition, and tracks and re-identifies pedestrians based on their key features at runtime. ...
extractors, processors, reducers, and combiners ...
doi:10.1109/jiot.2019.2954804
fatcat:oyeijzcn3jbrpbakkinifditse
Dataspace Support Platform for e-Science
2012
Computer Science
This work intends to provide a data management solution based on the concepts of dataspaces for the large-scale and long-term management of scientific data. ...
We present a theoretical dataspace model for e-Science applications, its implementation within a dataspace support platform and an experimental evaluation on top of two real world application domains. ...
The experimental evaluation uses an initial prototype of jSpace (v1.2), which uses the Jena framework [1] to provide persistent RDF data storage in a MySQL database and the iRODS system as to implement ...
doi:10.7494/csci.2012.13.1.49
fatcat:op7qjb6wtnay5ia56scr32sjwe
A novel IoT-based health and tactical analysis model with fog computing
2021
PeerJ Computer Science
For this, a task management algorithm based on priority queue and list of fog nodes is modified in the fog layer. ...
In the architecture based on fog computing and IoT, priority processes are computed with low latency. ...
In another study, the health status of marathon runners was monitored with a WSN (Pfisterer et al., 2006) . Data was collected with sensors in runners and analyzed offline in a database. ...
doi:10.7717/peerj-cs.342
pmid:33816993
pmcid:PMC7959607
fatcat:v2x4aiy755fz7ckb5qx5zd34ye
Towards Improving the Usability and Security of Web Single Sign-On Systems
2013
Zenodo
The formal analysis identified three weaknesses in the protocol, and based on the attack traces from the model checking engine, six exploits and a semiautomated vulnerability assessment tool were designed ...
Third, we examined the OAuth 2.0 implementations of three major IdPs and 96 popular RP websites. ...
B sends response type=code, i, p, r and optional a to IdP. IdP checks i, p and r against its own local storage.
4. IdP presents a login form to authenticate the user. ...
doi:10.5281/zenodo.3264671
fatcat:iorqjr7rmnevfp2opa7uvv3qpq
Experimental Cyber Attack Detection Framework
2021
Electronics
Digital security plays an ever-increasing, crucial role in today's information-based society. ...
However, such instruments are used mainly offline with the purpose of auditing existing IDS/IDPS solutions. ...
Gheorghit ,ȃ is a system and network engineer at the "Gheorghe Asachi" Technical University of Iasi, Romania. ...
doi:10.3390/electronics10141682
fatcat:h4tpj4ihkvfanhn6fpmwkjwqjy
Security And Privacy Requirements And Secure Storage Architecture
2016
Zenodo
Last but not least, it summarizes cloud-based architecture for processing of privacy-sensitive data related to biobanking and architecture for their secure storage. ...
This document focuses on providing a comprehensive list of requirements for implementing IT services of BBMRI-ERIC as well as for interacting with other infrastructures which will provide services to BBMRI-ERIC ...
of a vector. ...
doi:10.5281/zenodo.161551
fatcat:ib7ll46gifc3foabgsbrpjylnm
Implementation and Design of Wireless IoT Network using Deep Learning
2021
Turkish Journal of Computer and Mathematics Education
The Internet of Things (IoT) is a technology and plays a key role in just this process. ...
WC is a budding technology in IoT, and it involves further learning. This dilemma motivates the authors to suggest a standardized IoT WC system. ...
The overloading consideration of the proposed decision process based on ML is Often superior to IDP, at 1.36 IDP times on great average. ...
doi:10.17762/turcomat.v12i3.761
fatcat:6zrmbsn4gbettoldvpyjouhp64
An Autonomic Framework for Integrating Security and Quality of Service Support in Databases
2012
2012 IEEE Sixth International Conference on Software Security and Reliability
Similar to traditional IDPSs, database IDPS (DBIDPS) can be broadly classified as misuse and anomaly based. ...
Equally, there is a great dependence on databases to provide data storage and retrieval mechanisms for the organization's information systems. ...
doi:10.1109/sere.2012.15
dblp:conf/ssiri/AlomariM12
fatcat:fzp6bqpr7fdhbcwpduqx7pc2sa
« Previous
Showing results 1 — 15 out of 176 results