Filters








829 Hits in 2.6 sec

Opportunistic mobile social networks: architecture, privacy, security issues and future directions

Vimitha R. Vidhya Lakshmi, Gireesh Kumar T.
2019 International Journal of Electrical and Computer Engineering (IJECE)  
The main contribution of this paper is regarding privacy and security issues in Opportunistic Mobile Social Networks.  ...  Finally, some future research directions in Opportunistic Mobile Social Networks have been elaborated regarding the data's privacy and security.  ...  PRIVACY AND SECURITY ISSUES IN OPPORTUNISTIC MSN The privacy and security issues in opportunistic networking are discussed in detail in [5] .  ... 
doi:10.11591/ijece.v9i2.pp1145-1152 fatcat:krsz436h3bfijf7enohj5dyvwm

Twitter in disaster mode

Theus Hossmann, Paolo Carta, Dominik Schatzmann, Franck Legendre, Per Gunningberg, Christian Rohner
2011 Proceedings of the Special Workshop on Internet and Disasters - SWID '11  
In this paper, we present Twimight and its network security extensions.  ...  In such situations, the phones' capabilities of infrastructure-less communication can fill in: By propagating data opportunistically (from phone to phone), tweets can still be spread, yet at the cost of  ...  simple anti-spam scheme avoiding misbehaving users to flood the network with less important tweets.  ... 
doi:10.1145/2079360.2079367 fatcat:efrwmhdbxregtm2xb2nvjhcqwq

A secure, efficient, and cost-effective distributed architecture for spam mitigation on LTE 4G mobile networks

Elias Bou-Harb, Makan Pourzandi, Mourad Debbabi, Chadi Assi
2012 Security and Communication Networks  
In this paper, we focus on a SPAM flooding attack, namely SMTP SPAM, and demonstrate, through simulations and discussion, its DoS impact on the Long Term Evolution (LTE) network and subsequent effects  ...  The 4G of mobile networks will be a technology-opportunistic and user-centric system, combining the economical and technological advantages of various transmission technologies.  ...  For future work, we plan to work on collaborative preventive approaches against SPAM flooding in LTE networks. Figure 1 . 1 Broadband Figure 3 . 3 LTE EPC [24] .  ... 
doi:10.1002/sec.413 fatcat:amjwtdxkqvgcjpfxf3nv7ni3fq

Editorial: Fourth Quarter 2015 IEEE Communications Surveys and Tutorials

Ekram Hossain
2015 IEEE Communications Surveys and Tutorials  
Anonymity networks prevent traffic analysis and network surveillance, or at least make it more difficult.  ...  The paper titled "A Survey on Opportunistic Routing in Wireless Communication Networks" by Nessrine Chakchouk presents a comprehensive survey of the existing literature related to opportunistic routing  ... 
doi:10.1109/comst.2015.2495008 fatcat:n3pvj2nvm5hxncj5oxqcd7cbvy

Improving Organizational Information Security Strategy via Meso-Level Application of Situational Crime Prevention to the Risk Management Process

Nicole L. Beebe, V. Srinivasan Rao
2010 Communications of the Association for Information Systems  
., -zombies‖) in the furtherance of other goals (e.g., establishing communication networks and launching distributed attacks).  ...  Perceived Threats (Step 2a): ITforYou, Inc. perceives two primary threats-the opportunist seeking a target of opportunity and the anti-spam hacktivist receiving what they believe is spam from ITforYou,  ...  ACKNOWLEDGEMENTS Srinivasan Rao's participation in this research was supported in part by a grant from the College of Business at UTSA.  ... 
doi:10.17705/1cais.02617 fatcat:jgadnevq4ze4ncxwlb4rahcczu

TrustMeter: A trust assessment scheme for collaborative privacy mechanisms in participatory sensing applications

Delphine Christin, Daniel Rodriguez Pons-Sorolla, Matthias Hollick, Salil S. Kanhere
2014 2014 IEEE Ninth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP)  
We investigate the TrustMeters performance under different attacks by means of extensive simulations, and show that it succeeds in quarantining malicious users in most analyzed scenarios.  ...  Users can mutually preserve their privacy by opportunistically exchanging sensor readings during physical meetings, thus breaking the link between the collected data and their permanent identities.  ...  Therefore, we focus on solutions tailored to delay tolerant and opportunistic networks [11] sharing the more similarities with our system model (see Sec. II-A).  ... 
doi:10.1109/issnip.2014.6827614 dblp:conf/issnip/ChristinPHK14 fatcat:63octulrfraabghdmja627sfla

Video interactions in online video social networks

Fabrício Benevenuto, Tiago Rodrigues, Virgilio Almeida, Jussara Almeida, Keith Ross
2009 ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)  
In addition to providing valuable statistical models for various characteristics, our study uncovers typical user behavioral patterns in video-based environments and shows evidence of opportunistic behavior  ...  Based on crawled data covering a representative subset of videos and users, we present a characterization from two perspectives: the video response view and the interaction network view.  ...  -Evidence of opportunistic behavior in online video social networks. Our study unveils evidence of two types of opportunistic behavior by YouTube users, namely promotion and video spamming.  ... 
doi:10.1145/1596990.1596994 fatcat:hjjjujdjkra4bcclkmvggfbflq

PIF: A Personalized Fine-Grained Spam Filtering Scheme With Privacy Preservation in Mobile Social Networks

Kuan Zhang, Xiaohui Liang, Rongxing Lu, Xuemin Shen
2015 IEEE Transactions on Computational Social Systems  
Mobile social network (MSN) emerges as a promising social network paradigm that enables mobile users' information sharing in the proximity and facilitates their cyber-physical-social interactions.  ...  As the advertisements, rumors, and spams spread in MSNs, it is necessary to filter spams before they arrive at the recipients to make the MSN energy efficient.  ...  Social network, i.e., the social graph formed by users in the network, is another helpful methodology to detect and filter spams. Lahmadi et al.  ... 
doi:10.1109/tcss.2016.2519819 fatcat:tu3z53chyrcu7d5va3neduktaa

Overview of Challenges in Securing a Cognitive Radio Network

Simi Ranjith, Dr. Sanjay Jain
2016 International Journal of Engineering Research and  
Cognitive Radio Network (CRN) is a promising wireless network where smart devices are able to opportunistically exploit the spectrum holes and optimize the overall radio spectrum use.  ...  Secure communication is the key of success for any wireless network. As cognitive radio networks are wireless in nature, they face all classic threats present in the conventional wireless networks.  ...  DOS ATTACKS IN COGNITIVE RADIO NETWORKS A denial of service is characterized by an explicit attempt by an attacker to prevent legitimate users from gaining access to the desired network resources.  ... 
doi:10.17577/ijertv5is010327 fatcat:bzt53jhe2ndztnk4xhuiiiyvrq

Mobile Social Networks: Architecture, Privacy, Security Issues and Solutions

Vimitha R Vidhya Lakshmi, Gireesh Kumar T
2017 Journal of Communications  
Statistical surveys show that almost 80% of people are involved in such kind of networking. This paper gives an overview of recent related works contributed in Mobile social networks.  ...   -Mobile social networks are applications or platforms that allow mobile users to communicate or interact with each other.  ...  This type of communication layout is seen in opportunistic network, ad-hoc network or delay tolerant network. Proximity marketing [6] is an example in which this kind of structural layout is seen.  ... 
doi:10.12720/jcm.12.9.524-531. fatcat:suttgxkaxfcmlo5zgisqhszh6m

Variants of Ransomware Assaults and Prevention Strategies

2020 International Journal of Engineering and Advanced Technology  
Here in this paper we focus on types of ransomware its detection and prevention of different types of ransomware attacks  ...  In current days various types of Ransomware categorized as crypto ransomware and locker ransomware which prevents user from accessing their system, either by locking the system's screen or block access  ...  Often, using best practices from email security and spam filtering to prevent unwanted attachments from appearing in mail box.  ... 
doi:10.35940/ijeat.d6843.049420 fatcat:nvcfahvtdzhotkkvl4fudlbwla

Detection of Video Spam In Social Network Based Neural Network Convolution

Fatna EL MENDILI, National School of Applied Sciences, Ibn Tofail University, Kenitra, Morocco
2019 International Journal of Advanced Trends in Computer Science and Engineering  
In this article, we have proposed a new approach to limit the dissemination and dissemination of spam videos on social networks, both when they are downloaded as an opening publication and when they are  ...  Since using online social networking services, users trust that they will be protected against all types of malicious content, including spam videos, which could compromise patient and user satisfaction  ...  The problem of detecting these spam videos consists in the possibility of preventing a video V_i from being a spam video using a classifier, C : U_i → {Spam video, legitimate video} (1) These spam videos  ... 
doi:10.30534/ijatcse/2019/53842019 fatcat:rbjq57s6pfcj5pdoexrfeojsny

Connected Consumption: The Hidden Networks of Consumption

Kwan Hong Lee, Dawei Shen, Andrew Lippman, David Reed, Hans D. Schumacher
2009 2009 6th IEEE Consumer Communications and Networking Conference  
It can also help people connect opportunistically in a local area to make group purchases, to pick up an item for a friend, and to perform reverse auctions.  ...  networked consumers.  ...  to thank Bill Wagner and Jeff Carter for their support; to Sandy Pentland for research guidance; to Ray Garcia and Erik Ross for intensive discussions on various points of the project; to Michael King in  ... 
doi:10.1109/ccnc.2009.4784721 dblp:conf/ccnc/LeeSLRS10 fatcat:yrkd2q7u35ex3dvcm5l4oeiuyi

An Evaluation of Routing Reliability in Non-collaborative Opportunistic Networks

Ling-Jyh Chen, Che-Liang Chiou, Yi-Chao Chen
2009 2009 International Conference on Advanced Information Networking and Applications  
An opportunistic network is a type of challenged network that has attracted a great deal of attention in recent years.  ...  In this study, we identify five types of non-collaborative behavior, namely free rider, black hole, supernova, hypernova, and wormhole behavior, in opportunistic networks.  ...  ; in other words, it is similar to email spamming, network worms, and denial of service attacks on the Internet.  ... 
doi:10.1109/aina.2009.54 dblp:conf/aina/ChenCC09 fatcat:vaesfy2bbzcpfpumnnzhhzk7a4

Identifying video spammers in online social networks

Fabricio Benevenuto, Tiago Rodrigues, Virgilio Almeida, Jussara Almeida, Chao Zhang, Keith Ross
2008 Proceedings of the 4th international workshop on Adversarial information retrieval on the web - AIRWeb '08  
In many video social networks, including YouTube, users are permitted to post video responses to other users' videos.  ...  We then show that our approach succeeds at detecting much of the spam while only falsely classifying a small percentage of the legitimate videos as spam.  ...  Marcos Gonçalves (Federal University of Minas Gerais -Brazil) for his valuable suggestions in Section 5.  ... 
doi:10.1145/1451983.1451996 dblp:conf/airweb/BenevenutoRAAZR08 fatcat:tn7kfex6k5hs7mutedcpqvkzeq
« Previous Showing results 1 — 15 out of 829 results