skip to main content
Reflects downloads up to 16 Oct 2024Bibliometrics
Skip Table Of Content Section
article
The effective method of database server forensics on the enterprise environment

When a forensic investigation is carried out in the enterprise environment, most of the important data are stored in database servers, and data stored in them are very important elements for a forensic investigation. As for database servers with such ...

article
Detection of botnets before activation: an enhanced honeypot system for intentional infection and behavioral observation of malware

As botnets have become the primary means for cyber attacks, how to detect botnets becomes an important issue for researchers and practitioners. In this study, we introduce a system that is designed to detect botnets prior to their activation. Pre-...

article
Adaptive scheduling strategies for cloud-based resource infrastructures

This paper proposes to employ linear programming algorithms for global resource scheduling to reduce the extra cost, including power consumption as well as operation expenditures, for remote resource access in a cloud-based resource pool. Unlike ...

article
Bayesian Approach with Maximum Entropy Principle for trusted quality of Web service metric in e-commerce applications

Trusted quality of Web service (QoWS) issue is critical for e-commerce applications. However, many existing studies have little work in situations that have insufficient or no historical information regarding QoWS data. In this study, we propose a ...

article
Identity-based construction for secure and efficient handoff authentication schemes in wireless networks

With the rapid development of computer networks, wireless technologies find important applications in roaming communication. In this scenario, practical needs initiate the demand for a secure and efficient handoff authentication scheme. To the best of ...

article
Detecting SYN flooding attacks based on traffic prediction

SYN flooding attacks are a common type of distributed denial-of-service attacks. Up to now, many defense schemes have been proposed against SYN flooding attacks. Traditional defense schemes rely on passively sniffing an attacking signature and are ...

article
Study on the security of the extended version for the ISO/IEC international standardized block cipher SEED

In this paper, we analyze the block cipher SEED-192, which is an extended version of the ISO/IEC block cipher SEED. According to the result of this paper, there exist weak keys in 8 out of the 20 rounds of SEED-192 against related-key differential ...

article
Self-organizing life cycle management of mobile ad hoc networks

A mobile ad hoc network (MANET) is a type of wireless network without any infrastructure, where nodes must adapt to the changing dynamic situations that result from their mobility. Because of the decentralization of nodes and the security needs of ...

article
On the security of PPPoE network

Point-to-Point Protocol over Ethernet (PPPoE) is a network protocol for encapsulating PPP frames inside Ethernet frames. It is widely used by commercial Internet service providers to provide Internet surfing for customers who pay bills. In this paper, ...

article
Proactive recovery approach for intrusion tolerance with dynamic configuration of physical and virtual replicas

Proactive recovery mechanism has been widely used in building intrusion-tolerant systems that are able to tolerate an arbitrary number of faults. However, previous proactive recovery methods seldom consider the dynamic in attacking power that may cause ...

article
A quantitative approach to estimate a website security risk using whitelist

Despite much research on defense against phishing attacks, incidents continue to occur where sensitive (e.g., personal or financial) information is stolen using social engineering and technical spoofing techniques. Most approaches use the notions of ...

article
A partially reconstructed previous Gmail session by live digital evidences investigation through volatile data acquisition

The essence of this paper is to illustrate live data acquisition within the random access memory of a notebook trying to utilize the collected digital evidences in order to partially reconstruct previous Gmail session, which could be probative digital ...

article
Quantitative intrusion intensity assessment for intrusion detection systems

One of the main problems of existing approaches in anomaly detection in intrusion detection system (IDS) is that IDSs provide only binary detection result: intrusion (attack) or normal. If some attack data or normal data is belonged to boundary, they ...

article
Simple SMS spam filtering on independent mobile phone

The amount of Short Message Service (SMS) spam is increasing. Various solutions to filter SMS spam on mobile phones have been proposed. Most of these use Text Classification techniques that consist of training, filtering, and updating processes. However,...

Comments