46 Hits in 4.8 sec

Study of Peer-to-Peer Network Based Cybercrime Investigation: Application on Botnet Technologies [article]

Mark Scanlon
2017 arXiv   pre-print
The requirement for investigating P2P based systems is not limited to the more obvious cybercrimes listed above, as many legitimate P2P based applications may also be pertinent to a digital forensic investigation  ...  A proof of concept tool was developed for conducting investigations on the BitTorrent network.  ...  M-Tahar Kechadi, for his guidance and encouragement. I would like to thank  ... 
arXiv:1712.03455v1 fatcat:brkwhni6vza2dm7ristaj5gyoa

Network of Information (NetInf) – An information-centric networking architecture

Christian Dannewitz, Dirk Kutscher, Börje Ohlman, Stephen Farrell, Bengt Ahlgren, Holger Karl
2013 Computer Communications  
The results suggest that a scalable NRS for 10 15 and more objects with resolution latencies (well) below 100 ms is possible, implying that a global Network of Information that removes the need for today's  ...  Information-centric networking (ICN) is a promising approach to networking that has the potential to provide better -more natural and more efficient -solutions for many of today's important communication  ...  Acknowledgments The authors thank the partners from the 4WARD and SAIL EU projects for their contributions in many discussions on NetInf and Sebastian Dröge for his implementation support.  ... 
doi:10.1016/j.comcom.2013.01.009 fatcat:q5iex6kmsbgwpkipdrqtiie6uu


María Elisa Bertinat, Daniel De Vera, Darío Padula, Franco Robledo Amoza, Pablo Rodríguez-Bocca, Pablo Romero, Gerardo Rubino
2009 Proceedings of the 5th International Latin American Networking Conference on - LANC '09  
GoalBit is the first open source peer-to-peer system for the distribution of real-time video streams through the Internet.  ...  The main advantage of a P2P architecture is the possibility of exploiting the available bandwidth unused by the set of user' hosts connected to the network.  ...  Also, these protocols were designed for the transference of one (or more) files of a fixed size; they don't support the transference of a continuous flow.  ... 
doi:10.1145/1636682.1636691 dblp:conf/lanc/BertinatVPARRR09 fatcat:fg5mqn627fgabl62brfsw4iv74

Legal Education in the Blockchain Revolution

Mark Fenwick, Wulf A. Kaal, Erik P. M. Vermeulen
2017 Social Science Research Network  
Blockchain focusing on its potential for the education sector.  ...  The European Commission shall not be held liable for any consequence stemming from the reuse.  ...  and transfer of credits between universities -the problem that has yet to be solved is the transfer of metadata.  ... 
doi:10.2139/ssrn.2939127 fatcat:7jvxzzixazf77hpevogzuuwtn4

Autonomous decentralised M2M application service provision

Michael Steinheimer, Ulrich Trick, Michael Steinheimer, Bogdan Ghita, Woldemar Fuhrmann
2017 2017 Internet Technologies and Applications (ITA)  
approaches for the realisation of an optimised MSP.  ...  Use Case 4: Energy Optimisation The use case "energy optimisation", illustrated in Figure 2 .13, demonstrates an M2M application service realised by multiple end-users each providing individual and independent  ...  The messaging effort for the scenario in which the ANs are connected to each ...  ... 
doi:10.1109/itecha.2017.8101904 fatcat:iixuusgvsneh3emppuuvbteklq

A Review of Intrusion Detection and Blockchain Applications in the Cloud: Approaches, Challenges and Solutions

Osama Alkadi, Nour Moustafa, Benjamin Turnbull
2020 IEEE Access  
The attackers exploited each cryptocurrency network and temporarily gained more than half of the total global mining hash rate for each currency, effectively centralizing the decentralized systems [2]  ...  The technology is a fundamental element of cloud implementations, which delivers essential cloud features of resource pooling, location independence, and rapid elasticity.  ...  A distributed CID system is independent, autonomous techniques that employ Peer-to-Peer (P2P) network architecture and therefore do not reply to the central coordinator unit for data analysis and correlation  ... 
doi:10.1109/access.2020.2999715 fatcat:qz677wrupvcblbvcrm74owmjyu

Systems Applications of Social Networks

Changtao Zhong, Nishanth Sastry
2017 ACM Computing Surveys  
Using this framework, we survey applications of social networks in three typical kinds of application scenarios: recommender systems, content-sharing systems (e.g., P2P or video streaming), and systems  ...  In each case, we discuss potential directions for future research that involve using social network properties.  ...  In P2P systems, data is transferred directly between computers belonging to two end users of the network, or two peers.  ... 
doi:10.1145/3092742 fatcat:hcfudmor4feonjlalyma2l6owy

Storage Tradeoffs in a Collaborative Backup Service for Mobile Devices

Ludovic Courtes, Marc-olivier Killijian, David Powell
2006 2006 Sixth European Dependable Computing Conference  
Keys are used to create an unambiguous identification number for each peer and for the stored files with the aid of a hash function.  ...  For the moment, there is only one P2P simulation available for NS2 which is Gnutella.  ... 
doi:10.1109/edcc.2006.26 dblp:conf/edcc/CourtesKP06 fatcat:tcpc3n54zfblpi6pcflna7dgfy

Privacy-Preserving Schemes for Safeguarding Heterogeneous Data Sources in Cyber-Physical Systems

Marwa Keshk, Benjamin Turnbull, Elena Sitnikova, Dinusha Vatsalan, Nour Moustafa
2021 IEEE Access  
This paper introduces a comprehensive review of the current privacy-preserving techniques for protecting CPS systems and their data from cyber attacks.  ...  power, water, gas systems and smart grids produce heterogeneous and huge amount of data from various devices and networks, therefore it is essential to develop efficient privacy-preserving techniques for  ...  A Blockchain contains each block's metadata (the time stamp and hash value of the previous block) and payload (original data), with the time provided in each block usually represented by a discrete value  ... 
doi:10.1109/access.2021.3069737 fatcat:zcgizjkslzbonejocasygt464u

Fake BTS Attacks of GSM System on Software Radio Platform

Yubo Song, Kan Zhou, Xi Chen
2012 Journal of Networks  
In most communication systems, information encryption and error correction are always independent. While joint encryption and error correction codes combine these two processes into one.  ...  In the fourth paper, "A Statistical Amalgamation Approach for Ontologies" by Peng Liu et al., put forward another way of ontology merging.  ...  P2P nodes based on the supervision game and the P2P incentive mechanism for identification of node information.  ... 
doi:10.4304/jnw.7.2.275-281 fatcat:3ejjimllcvewjeifopbvhl3zmi

A Comprehensive Survey for Intelligent Spam Email Detection

Asif Karim, Sami Azam, Bharanidharan Shanmugam, Krishnan Kannoorpatti, Mamoun Alazab
2019 IEEE Access  
In this paper, we considered 4 parts in the email's structure that can be used for intelligent analysis: (A) Headers Provide Routing Information, contain mail transfer agents (MTA) that provide information  ...  (B) The SMTP Envelope, containing mail exchangers' identification, originating source and destination domains\users.  ...  mail transfer protocol.  ... 
doi:10.1109/access.2019.2954791 fatcat:ikt6cayggbb2dkrm52fxzz2dqm

Microlearning in health professions education

Jennie C. De Gagne, Amanda Woodward, Hyeyoung K. Park, Huilin Sun, Sandra S. Yamane
2018 The JBI Database of Systematic Reviews and Implementation Reports  
The studio is an important research centre for the LFUI in terms of generating new knowledge in the field of microlearning. Moreover Prof.  ...  Theo Hug was initiating and is now coordinating the new research network "Innsbruck Media Studies (IMS)".  ...  Freeing MicroContent from its container allows for all kind of new ways of using, reusing, hashing, mixing and mashing content.  ... 
doi:10.11124/jbisrir-2017-003884 pmid:30489350 fatcat:hgqjcgrvlnhr5dnag37f5a7ffy

D2.4 Profiling Analytics and Privacy Methodological Foundations Release I

Suite5, Frankfurt University, UBITECH, NTUA
2018 Zenodo  
The results reported in the previous three deliverables of WP2 (D2.1, D2.2 and D2.3) will be aggregated in one deliverable, which will be independently assessed by the Ethics Advisory Board of ChildRescue  ...  We informed the prosecutor for the investigation of the case. The girl was transferred to a shelter.  ...  dropping the key or using one-way hashes).  ... 
doi:10.5281/zenodo.2542731 fatcat:ecplhyb5hrapffb4amahnfr6ry

A framework for cascading payment and content exchange within P2P systems

G K Arora
Words can not express the gratitude I feel for both these excellent people whose help and experience I could not have done without through this very long and arduous journey and for believing in me when  ...  First and foremost, I would like to express my deep gratitude, honour, and admiration for my supervisors Prof. Madjid Merabti and Dr. Martin Hanneghan.  ...  Morpheus provides improved search capabilities based on metadata embedded in common media formats.  ... 
doi:10.24377/ljmu.t.00005808 fatcat:sd7oigjvgngxdcmzfwdmug65py

A Systematic Survey of Online Data Mining Technology Intended for Law Enforcement

Matthew Edwards, Awais Rashid, Paul Rayson
2015 ACM Computing Surveys  
Manual inspections becoming increasingly infeasible, law enforcement bodies are optimising online investigations through data-mining technologies.  ...  online data mining literature which visibly targets law enforcement applications, using evidence-based practices in survey-making to produce a replicable analysis which can be methodologically examined for  ...  media organisations.  ... 
doi:10.1145/2811403 fatcat:qpvfebejpfgp5bh3cgykaoumze
« Previous Showing results 1 — 15 out of 46 results