383 Hits in 2.8 sec

Measuring robustness of complex networks under MVC attack

Rong-Hua Li, Jeffrey Xu Yu, Xin Huang, Hong Cheng, Zechao Shang
2012 Proceedings of the 21st ACM international conference on Information and knowledge management - CIKM '12  
Measuring robustness of complex networks is a fundamental task for analyzing the structure and function of complex networks.  ...  First, we present two robustness metrics of complex networks based on MVC attack.  ...  Acknowledgments The work was supported by grant of the Research Grants Council of the Hong Kong SAR, China No. 419109 and 411211.  ... 
doi:10.1145/2396761.2398463 dblp:conf/cikm/LiYHCS12 fatcat:ykzxghe73jbgfmrsq27hvpuyaq

Measuring the impact of MVC attack in large complex networks

Rong-Hua Li, Jeffrey Xu Yu, Xin Huang, Hong Cheng, Zechao Shang
2014 Information Sciences  
Measuring the impact of network attack is an important issue in network science.  ...  The results show that P2P and co-authorship networks are extremely robust under the MVC attack while both the online social networks and the Email communication networks exhibit vulnerability under the  ...  As can be seen in Table 3 , the P2P networks are more robust than other types of networks under MVC attack.  ... 
doi:10.1016/j.ins.2014.03.085 fatcat:qzdiiggz2vaq3l53riijzokwxa

Security Concerns of Object Oriented Software Architectures

Dinesh KumarSaini
2012 International Journal of Computer Applications  
Testing and measuring the security of software system architectures is a difficult task.  ...  An attempt is made in this paper to analyze the issues of architecture security of objectoriented software's using common security concepts to evaluate the security of a system under design.  ...  The root of most security problems is software that fails in unexpected ways when under attack [7, 10] .  ... 
doi:10.5120/5012-7334 fatcat:2apv3x353zaylgl4dwptkni2bq

Implementation of clinical research trials using web-based and mobile devices: challenges and solutions

Roy Eagleson, Luis Altamirano-Diaz, Alex McInnis, Eva Welisch, Stefanie De Jesus, Harry Prapavessis, Meghan Rombeek, Jamie A. Seabrook, Teresa Park, Kambiz Norozi
2017 BMC Medical Research Methodology  
This paper provides a detailed overview of the challenges the study faced in meeting the high standards of our Research Ethics Board, specifically regarding patient privacy.  ...  With the increasing implementation of web-based, mobile health interventions in clinical trials, it is crucial for researchers to address the security and privacy concerns of patient information according  ...  Funding This study was supported by research grants from Innovation Fund of the Alternative Funding Plan of the Academic Health Sciences Centres of Ontario (AMOSO, #INN 12-003) and a grant from Children's  ... 
doi:10.1186/s12874-017-0324-6 pmid:28302050 pmcid:PMC5356263 fatcat:blhls4kqzbb7zm6k6nxskqych4

A Method of Parallelizing Consensuses for Accelerating Byzantine Fault Tolerance

Junya NAKAMURA, Tadashi ARARAGI, Toshimitsu MASUZAWA, Shigeru MASUYAMA
2014 IEICE transactions on information and systems  
for the completion of the previous execution of the consensus protocol.  ...  In this paper, we also prove the correctness of our method and experimentally compare it with the existing method in terms of latency and throughput.  ...  Kakugawa and Ooshita of Osaka University for their helpful discussions about improving this paper.  ... 
doi:10.1587/transinf.e97.d.53 fatcat:fck7spd47nhvjnxpu6wc66pvuu

Graph Theory: A Comprehensive Survey about Graph Theory Applications in Computer Science and Social Networks

Abdul Majeed, Ibtisam Rauf
2020 Inventions  
Recently, graphs have been extensively used in social networks (SNs) for many purposes related to modelling and analysis of the SN structures, SN operation modelling, SN user analysis, and many other related  ...  Considering the widespread applications of GT in SNs, this article comprehensively summarizes GT use in the SNs. The goal of this survey paper is twofold.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/inventions5010010 fatcat:pibjltaz3bcxpms3r5vaanp3t4

Usage of Artificial Intelligence to Improve Secure Software Development

Ahmet EFE
2021 Journal of International Scientific Researches  
An assessment of the review is conducted according to artificial neural network logic to help improve the Security of C# software development and further evaluations and deductions are being conducted.  ...  It is important, because securing the code during the creation of the software is easy as compared with the end of the software creation.  ...  Assume that an attacker tries to harm the network by using the customer's device.  ... 
doi:10.23834/isrjournal.824662 fatcat:dcohk43h2rd7jg5olkzbmko7ku

Toward Quality Attribute Driven Approach to Software Architectural Design

Payel Bajpayee, Hassan Reza
2017 Journal of Software Engineering and Applications  
It has been well-documented that the software architecture of any system plays a critical role in success or failure of software intensive systems.  ...  The comparative study was driven by study of quality attributes and tactics with the selected architectures to select the optimal one.  ...  ) of a system under construction does play a key role in the selection of appropriate design [3] .  ... 
doi:10.4236/jsea.2017.106027 fatcat:wfxyst7rvzbxhhupz3j3bd64ee

A Network Planning and Management Tool for mitigating the impact of spatially correlated failures in infrastructure networks

Arun Das, Arunabha Sen, Chunming Qiao, Nasir Ghani, Nathalie Mitton
2016 2016 12th International Conference on the Design of Reliable Communication Networks (DRCN)  
Tool (NPMT) that facilitates the design and provisioning of robust and resilient networks.  ...  Department of Defense, and by consolidating a wide range of theories and solutions developed in the last few years, the authors of this paper have developed an advanced Network Planning and Management  ...  parts of their network against a WMD attack, and (ii) reinforce the network with least cost to eliminate or significantly reduce the threat of network disruption due to a WMD attack.  ... 
doi:10.1109/drcn.2016.7470837 dblp:conf/drcn/DasSQGM16 fatcat:dkdmvc7wdnadbl22n7emvxcju4

Toward enhancing the distributed video coder under a multiview video codec framework

Shih-Chieh Lee, Jiann-Jone Chen, Yao-Hong Tsai, Chin-Hua Chen
2016 Journal of Electronic Imaging (JEI)  
For mobile devices or wireless applications, a distributed video coder (DVC) can be utilized to shift the encoder complexity to decoder under the MVV coding framework, denoted as multiview distributed  ...  Published by SPIE under a Creative Commons Attribution 3.0 Unported License.  ...  Under this MVC framework, the time complexity of encoding operations would be high for efficient compression.  ... 
doi:10.1117/1.jei.25.6.063022 fatcat:yllkrow2p5cvlnco32jgiupalq

Security Qualitative Metrics for Open Web Application Security Project Compliance

Ferda Özdemir Sönmez
2019 Procedia Computer Science  
, under six categories.  ...  , under six categories.  ...  [12] which used a limited set of features to measure and compare the attack surface of several applications and Manadhata and Wing [13] which defined attack surface based on application entry, exit  ... 
doi:10.1016/j.procs.2019.04.140 fatcat:7udpi6tykvfwpetlk6ey7krnji

DATS - Data Containers for Web Applications

Casen Hunger, Lluis Vilanova, Charalampos Papamanthou, Yoav Etsion, Mohit Tiwari
2018 Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS '18  
These two primitives act as robust declassifiers that allow DATS to enforce non-interference across containers, taking large applications out of the trusted computing base (TCB).  ...  We propose DATS -a system to run web applications that retains application usability and efficiency through a mix of hardware capability enhanced containers and the introduction of two new primitives modeled  ...  This research was supported by the Israeli Ministry of Science, Technology and Space, and a collaboration grant through HiPEAC (European Union's H2020 research and innovation programme under grant agreement  ... 
doi:10.1145/3173162.3173213 dblp:conf/asplos/HungerVPET18 fatcat:lv5rr5757jhmtbykalcajoyovq

Hyperspectral Unmixing Overview: Geometrical, Statistical, and Sparse Regression-Based Approaches

José M. Bioucas-Dias, Antonio Plaza, Nicolas Dobigeon, Mario Parente, Qian Du, Paul Gader, Jocelyn Chanussot
2012 IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing  
Due to low spatial resolution of HSCs, microscopic material mixing, and multiple scattering, spectra measured by HSCs are mixtures of spectra of materials in a scene.  ...  Imaging spectrometers measure electromagnetic energy scattered in their instantaneous field view in hundreds or thousands of spectral channels with higher spectral resolution than multispectral cameras  ...  The authors also acknowledge the Army Geospatial Center, US Army Corps of Engineers, for making the HYDICE Rterrain data set available to the community.  ... 
doi:10.1109/jstars.2012.2194696 fatcat:s66a35xjd5dqzkw5wwihq6ux64

Edge Rewiring Goes Neural: Boosting Network Resilience without Rich Features [article]

Shanchao Yang, Kaili Ma, Baoxiang Wang, Tianshu Yu, Hongyuan Zha
2022 arXiv   pre-print
Improving the resilience of a network is a fundamental problem in network science, which protects the underlying system from natural disasters and malicious attacks.  ...  Inductively solving graph-related tasks with sequential actions is accomplished by adopting graph neural networks (GNNs) coupled with reinforcement learning under the scenario with rich graph features.  ...  Network resilience was proposed and proved as a suitable measurement for describing the robustness and stability of a network system under such attacks [1] .  ... 
arXiv:2110.09035v3 fatcat:44znjknbszba5h3pwmydsc4wu4

Towards Automated Sexual Violence Report Tracking [article]

Naeemul Hassan, Amrit Poudel, Jason Hale, Claire Hubacek, Khandakar Tasnim Huq, Shubhra Kanti Karmaker Santu, Syed Ishtiaque Ahmed
2019 arXiv   pre-print
We define the sexual violence report tracking problem by considering victim, perpetrator contexts and the nature of the violence.  ...  We find that our model could identify sexual violence reports with a precision and recall of 80.4% and 83.4%, respectively. Moreover, we also applied the model during and after the \#MeToo movement.  ...  MVC achieved the high- measures, particularly recall and F1-measure, are lower than est F1-measures in 10 of the 17 total categories. random guess.  ... 
arXiv:1911.06961v1 fatcat:qsiuczq4lfbq5j7nh3bsnuchqm
« Previous Showing results 1 — 15 out of 383 results