Filters








90,064 Hits in 2.5 sec

Quickest detection of denial-of-service attacks in cognitive wireless networks

CaLynna Sorrells, Lijun Qian, Husheng Li
2012 2012 IEEE Conference on Technologies for Homeland Security (HST)  
Hence, in this paper, we formulate the detection of DOS attacks as a quickest detection problem, i.e., detect the abrupt changes in distributions of certain observables at the network layer with minimum  ...  Many denial-of-service (DOS) attacks in wireless networks, such as jamming, will cause significant performance degradation to the network and thus need to be detected quickly.  ...  Comparisons with existing related works on quickest detection for CR networks are given in Section 6.  ... 
doi:10.1109/ths.2012.6459913 fatcat:y7yy2j5kr5hodo7io3ubuzwfdq

A Novel Feature based Unified Node Data Analysis (FBU-NDA) based IDS using AODV in MANET

Trupti Agrawal, Swati Tiwari
2014 International Journal of Computer Applications  
In such network variable conditions of routing will face several issues which degrade its performance.  ...  As it is temporary in nature and is having movable devices for communication which makes such network as infrastructure less.  ...  Such as with the help of pre-emptive approach more information can be added for exact timely analysis of intrusion & its successful detection with high accuracy.  ... 
doi:10.5120/17840-8727 fatcat:ye375v7wxbfpzmu2j5oxr7krtq

A Hybrid Modeling of Mobile App Dynamics on Serial Causality for Malware Detection

Meilin Liu, Songjie Wei, Pengfei Jiang, Leandros Maglaras
2021 Security and Communication Networks  
However, due to neglecting the sequential features between network flows, existing malicious application recognition methods based on network traffic analysis have low recognition accuracy.  ...  Based on the network traffic characteristics of Android applications, this paper firstly applies Long Short-Term Memory network-based variational Auto-Encoder to extract the sequential feature of the application  ...  When the network scales or the network application environment changes, these statistics may also change accordingly, so it is unable to accurately and reliably describe the behavior of network application  ... 
doi:10.1155/2021/9994588 fatcat:haku5webcncojd2e7fjmrxsmfi

Web 2.0

Maria Claudia Buzzi, Marina Buzzi, Barbara Leporini
2011 Proceedings of the 9th ACM SIGCHI Italian Chapter International Conference on Computer-Human Interaction Facing Complexity - CHItaly  
With short messages (tweets), following and followers, Twitter is reshaping ways of interacting online. Thus, its accessibility is very important for social interaction as well as for work.  ...  In fact, as with the log-in procedure, in order to detect the error messages the user needs to read all the content sequentially.  ...  The app user interface changes with respect to the original Twitter interface.  ... 
doi:10.1145/2037296.2037333 dblp:conf/chitaly/BuzziBL11 fatcat:igu343xo7nd2phgpw2kiyol4w4

Using weaker consistency models with monitoring and recovery for improving performance of key-value stores

Duong Nguyen, Aleksey Charapko, Sandeep S. Kulkarni, Murat Demirbas
2019 Journal of the Brazilian Computer Society  
Overall, for applications considered in this paper, we find that even with rollback, eventual consistency provides better performance than using sequential consistency. requirement of any system, network  ...  In particular, in a scenario designed to intentionally cause a large number of violations, more than 99.9% of violations were detected in less than 50 ms in regional networks (all clients and servers in  ...  Authors' contributions All authors have contributed to the methodological and research aspects of the research. All authors have also read and approved the final manuscript.  ... 
doi:10.1186/s13173-019-0091-9 fatcat:6eogslvzonesnnsa7mhotie3ru

Using Weaker Consistency Models with Monitoring and Recovery for Improving Performance of Key-Value Stores [article]

Duong Nguyen, Aleksey Charapko, Sandeep S Kulkarni, Murat Demirbas
2019 arXiv   pre-print
In particular, in a scenario designed to intentionally cause a large number of violations, more than 99.9% of violations were detected in less than 50 milliseconds in regional networks, and in less than  ...  Overall, for applications considered in this paper, we find that even with rollback, eventual consistency provides better performance than using sequential consistency.  ...  Author's contributions All authors have contributed to the methodological and research aspects of the research. The authors have also read and approved the final manuscript.  ... 
arXiv:1909.01980v1 fatcat:uzijpapg2jcxhll4zghnzagdmu

Calibrating Network Traffic with One-Dimensional Convolutional Neural Network with Autoencoder and Independent Recurrent Neural Network for Mobile Malware Detection

Songjie Wei, Zedong Zhang, Shasha Li, Pengfei Jiang, Liguo Zhang
2021 Security and Communication Networks  
The design solves the problem that most existing approaches for mobile malware traffic detection struggle with capturing the network traffic dynamics and the sequential characteristics of anomalies in  ...  We conduct a series of experiments to evaluate the effectiveness of the proposed method and its performance for the 1DCAE-IndRNN-integrated detection procedure.  ...  with capturing the dynamic changes and key temporally local information in abnormal traffic flows from mobile applications.  ... 
doi:10.1155/2021/6695858 fatcat:txrafxs5qvafzbvypihtuvue6m

Monitoring the Environmental Impact of TiO$_{\bf 2}$ Nanoparticles Using a Plant-Based Sensor Network

Scott C. Lenaghan, Yuanyuan Li, Hao Zhang, Jason N. Burris, C. Neal Stewart, Lynne E. Parker, Mingjun Zhang
2013 IEEE transactions on nanotechnology  
The network consisted of potted Arabidopsis thaliana with a surrounding water supply, which was monitored by cameras attached to a laptop computer running a machine learning algorithm.  ...  The goal of this research was to develop a plant-based sensor network for characterizing, monitoring, and understanding the environmental impact of TiO2 nanoparticles.  ...  Being able to model and detect time-related changes allows periodic detection of the leaf color change, indicating exposure to the nanoparticles.  ... 
doi:10.1109/tnano.2013.2242089 pmid:28458617 pmcid:PMC5409134 fatcat:ja2eruegkjhnjedqayhzkzal3q

Socio-network Analysis of RTL Designs for Hardware Trojan Localization [article]

Sheikh Ariful Islam, Farha Islam Mime, S M Asaduzzaman, Farzana Islam
2019 arXiv   pre-print
In this paper, we propose to leverage principle features of social network analysis to security analysis of Register Transfer Level (RTL) designs against HT.  ...  We experiment the technique on 420 combinational HT instances, and on average, we can detect both triggering and payload signals with accuracy up to 97.37%.  ...  The technique was successful in detecting sequential HT, however, the proposed approach is applicable for combinational HT.  ... 
arXiv:1912.10312v1 fatcat:ejuuvrmptfgjhma26vnju6kmka

ANALYTICAL SURVEY OF ACTIVE INTRUSION DETECTION TECHNIQUES IN MOBILE AD HOC NETWORKS

R.M.Chamundeeswari .
2014 International Journal of Research in Engineering and Technology  
The rating on intrusion detection and supportive layer in MANET has provided with a resolution to extend it to the real world applications.  ...  Ad hoc Networks (MANETs) and also compare the latest techniques of Intrusion Detection dependent on their architecture and data gathering techniques.  ...  The aspiration suitable data dissemination approach is essential in mobile ad hoc networks (MANET) due to the repeated topology changes.  ... 
doi:10.15623/ijret.2014.0319105 fatcat:sbeuiv6ecfcetjoi5bkcwbphgu

Comparative Study of Pattern Mining Techniques for Network Management System Logs for Convergent Network [chapter]

Bodhisattwa Gangopadhyay, Artur Arsenio, Claudia Antunes
2012 Lecture Notes in Computer Science  
With propagation of time, the nature of the system might change and this forces a change in the a priori knowledge.  ...  In the previous sections we had an overview related to the state-of-the-art pattern mining techniques applicable to the alarm handling in different network management systems.  ... 
doi:10.1007/978-3-642-27872-3_16 fatcat:gb2cvolirvhxbh72byscv6bm3i

AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS

Kusum Lata, Sophia Dhankhar
2013 International Journal of Computer Applications Technology and Research  
periodically flood the network with table update messages which are required in a table-driven approach.  ...  In this paper, we design and formulate the inverted list based approach for providing safer path and effective communication in DSR protocol.Some nodes in network can participate in network more frequenctly  ...  [11] Zougagh Hicham performed a comparative study of intrusion detection in adhoc nework. In recent years, the use of mobile ad hoc network (MANETs) has been widespread in many applications.  ... 
doi:10.7753/ijcatr0203.1018 fatcat:h3vu44u7x5cnrdjcovc4ommu2y

GenAtSeq GAN with Heuristic Reforms for Knowledge Centric Network with Browsing Characteristics Learning, Individual Tracking and Malware Detection with Website2Vec

Chiranjib Sur
2020 SN Computer Science  
Our proposed GAN network is characterized for the detection of individuals through dissimilarity between real and generated samples and quantification of detected difference, both of which enhanced learning  ...  Our contributions are in the architectural definition of Generalized Attentive Sequential Generative Adversarial Network (GenAtSeq-GAN), identification of log characteristics for discrimination, and the  ...  Compliance with ethical standards Conflict of Interest The author declares that he has no conflict of interest.  ... 
doi:10.1007/s42979-020-00234-8 fatcat:tyowypduvrczrpieyhh2wycsau

Data Mining for Business Intelligence in Social Network: A survey

Smita Bhanap, Dr. Seema Kawthekar
2015 IARJSET  
This paper reviews basics of Data Mining, Social Network Analysis and its applications in Business Intelligence with data mining techniques and suggest how this survey and study of the data mining approaches  ...  can benefit the importance of social network analysis and mining for business intelligence.  ...  However, goal in this article is to provide an overview of the main technical research areas in relation to business impact.  ... 
doi:10.17148/iarjset.2015.21223 fatcat:234c6gpmengqrpwvfrz4tgrwve

SMCV: a Methodology for Detecting Transient Faults in Multicore Clusters

Diego Montezanti, Fernando Emmanuel Frati, Dolores Rexachs, Emilio Luque, Marcelo Naiouf, Armando De Giusti
2012 CLEI Electronic Journal  
This carries a growing vulnerability to transient faults, which increase their impact on multicore clusters running large scientific parallel applications.  ...  This paper introduces SMCV, which is a fully distributed technique that provides fault detection for message-passing parallel applications, by validating the contents of the messages to be sent, preventing  ...  Characterizing SMCV's Additional Workload Additional workload is related to computing amount added by the fault detection strategy.  ... 
doi:10.19153/cleiej.15.3.5 fatcat:hhkz5ro275b7viszgynbvalwte
« Previous Showing results 1 — 15 out of 90,064 results