mecs-press

Displaying 321-360 of 537 results

  • White Papers // Dec 2013

    Social Network Clustering

    As the users' know, the datasets related to social networks are increasing. There are different procedures to analyze these types of datasets; one of these procedures is clustering which makes communities of social data. Random walk is a process which can find communities in a network, in other words when...

    Provided By mecs-press

  • White Papers // Dec 2013

    A New Fault Detection Method Using End-to-End Data and Sequential Testing for Computer Networks

    Fault localization, a central part of network fault management, is a process of deducing the exact source of a failure from a set of observed failure indications. in the network, end systems and hosts communicate through routers and links connecting them. When a link or a router faces with a...

    Provided By mecs-press

  • White Papers // Jan 2014

    Grid Approach with Metadata of Messages in Service Oriented Architecture

    Service orientation architecture is playing a vital role in the middleware and enterprise organizations through its key design principles and there are many benefits of it as well. Loose Coupling between services is one of its design principles that help system or architecture to maintain its efficiency because services are...

    Provided By mecs-press

  • White Papers // Mar 2013

    A Proposed Model for Datacenter in -Depth Defense to Enhance Continual Security

    Defense in Depth is practical strategy for achieving Information Assurance in today's highly datacenter environments. It is a \"Best practices\" strategy in that it relies on the intelligent application of techniques and technologies that exist today. The strategy recommends a balance between the protection capability and cost, performance, and operational...

    Provided By mecs-press

  • White Papers // Apr 2013

    Performance of Personal Identification System Technique Using Iris Biometrics Technology

    The Iris identification as one of the significant techniques of biometric identification systems s and iris recognition algorithm is described. Biometric technology advances intellectual properties are wanted by many unauthorized personnel. As a result many researchers have being searching ways for more secure authentication methods for the user access. Iris...

    Provided By mecs-press

  • White Papers // Aug 2013

    Next Generation Electronic Passport Scheme Using Cryptographic Authentication Protocols and Multiple Biometrics Technology

    Electronic passports (e-passports) are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The e-passport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: cryptography security and...

    Provided By mecs-press

  • White Papers // Sep 2012

    Constraint Based Periodicity Mining in Time Series Databases

    The search for the periodicity in time-series database has a number of application, is an interesting data mining problem. In real world dataset are mostly noisy and rarely a perfect periodicity, this problem is not trivial. Periodicity is very common practice in time series mining algorithms, since it is more...

    Provided By mecs-press

  • White Papers // Jun 2013

    Wi-Fi Networks Security and Accessing Control

    As wireless networks access gains popularity in corporate, private and personal networks, the nature of wireless networks opens up new possibilities for network attacks. This paper negotiating Wi-Fi security against scanning of rogue Wi-Fi networks and other related activities and considers the monitoring of Wi-Fi traffic effects. The unauthorized Access...

    Provided By mecs-press

  • White Papers // Jul 2011

    A Framework for Ensuring Consistency of Web Services Transactions Based on WS-BPEL

    Transaction processing, as the key technology of Web Service Composition (WSC), has obtained wildly concern. WS-BPEL as a primary web service composition description language, which couldn't coordinate these web service transactions that distribute in a distributed computing environment reach consistent agreement on the outcome. This paper proposed two kinds of...

    Provided By mecs-press

  • White Papers // Oct 2009

    A Data-Fusion-Based Method for Intrusion Detection System in Networks

    Hackers' attacks are more and more intelligent, which makes it hard for single intrusion detection methods to attain favorable detection result. Therefore, many researchers have carried out how to combine multiple security measures to provide the network system more effective protection. However, so far none of those methods can achieve...

    Provided By mecs-press

  • White Papers // Aug 2012

    Proactive Security of E-Business

    Network security is a crucial problem in the construction of e-business. As the improvement of network openness, sharing and interconnection, the security problem is becoming more serious. After giving a brief statement to the theory of proactive security, based on the differences between passive defense and proactive security, the paper...

    Provided By mecs-press

  • White Papers // Oct 2012

    Analysis of Current Wireless Network Security

    Most threats against wireless networks involve an attacker with access to the radio link between wireless devices. Several of the threats listed in following rely on an attacker's ability to intercept and inject network communications. This highlights the most significant difference between protecting wireless and wired networks: the relative ease...

    Provided By mecs-press

  • White Papers // Feb 2012

    Research of Network Security and Information Encryption

    With the continuous development of the computer network, the global information has become the general trend of development of human beings. But due to the connection of computer network structure with the diversity, terminal and non-uniformity of distribution network interconnection of openness, etc. In the process of rapid development of...

    Provided By mecs-press

  • White Papers // Oct 2012

    Keywords Review of IT Security Literature in Recent 20 Years

    The volume of published scientific literature available on Internet has been increasing exponentially. Some of them reflect the latest achievement of the specific research domain. In recent years, many projects have been funded aiming to online scientific literature mining, especially in biomedical research. Scientific literature covers most of the hot...

    Provided By mecs-press

  • White Papers // Oct 2012

    Empirical Network Performance Evaluation of Security Protocols on Operating Systems

    Securing data transmission is currently a widely researched topic. There are numerous facades in data security. Virtual Private Network (VPN) is one such strand that provides security for data that is in motion. Performance of a network that has VPN implementation is at the forefront of network design and choice...

    Provided By mecs-press

  • White Papers // Sep 2013

    Security Mechanisms and Access Control Infrastructure for Biometrics Passport using Cryptographic Protocols

    Electronic passports (e-passports) are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The e-passport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: cryptography security and...

    Provided By mecs-press

  • White Papers // Sep 2013

    Design and Development of Biometrics Secure Person Detection System for E-Passport Using Cryptographic Security Protocols

    The biometric passports are to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. This IC chip is integrated into the cover of a passport, called a biometric passport. Biometric Passports have been introduced in...

    Provided By mecs-press

  • White Papers // Apr 2013

    Security Software Green Head for Mobile Devices Providing Comprehensive Protection From Malware and Illegal Activities of Cyber Criminals

    In this paper, the authors deal with the description of the threats to mobile devices and suggest the security software that provides comprehensive protection of personal data and mobile telephone from malware and illegal activity of cyber criminals. The developed security software Green Head protects personal Smartphone's of majority of...

    Provided By mecs-press

  • White Papers // Aug 2013

    Biometric Based Security Solutions for MANET: A Review

    Mobile ad hoc networks are self organizing, infrastructure-less, low power networks, design to deploy bandwidth-shared radio channel communication and to work under vulnerable environment. Security is primary concern in MANETs and in order to achieve high security (confidentiality, integrity, authentication, availability and non repudiation), several techniques have been explored in...

    Provided By mecs-press

  • White Papers // Jul 2012

    Security Measures in Data Mining

    Data mining is a technique to dig the data from the large databases for analysis and executive decision making. Security aspect is one of the measure requirements for data mining applications. In this paper, the authors present security requirement measures for the data mining. They summarize the requirements of security...

    Provided By mecs-press

  • White Papers // Apr 2011

    Design and Implementation for Malicious Links Detection System Based on Security Relevance of Webpage Script Text

    With the development of web technology, spreading of Trojan and viruses via website vulnerabilities is becoming increasingly common. In this paper, the authors propose a system for malicious links detection based on security relevance of webpage script text and present the design and implementation of this system. According to the...

    Provided By mecs-press

  • White Papers // Feb 2012

    Efficient Implementation of Electronic Passport Scheme Using Cryptographic Security Along With Multiple Biometrics

    Electronic passports have known a wide and fast deployment all around the world since the International Civil Aviation Organization the world has adopted standards whereby passports can store biometric identifiers. The use of biometrics for identification has the potential to make the lives easier, and the world people live in...

    Provided By mecs-press

  • White Papers // Apr 2013

    Criteria Specifications for the Comparison and Evaluation of Access Control Models

    Now-a-days, information systems cover all-important aspects of people's life, and computer applications are vastly used in widespread fields from medicine to military sector. Because of considerable dependence on computer-based systems, the security of the information saved in these systems is of great concern, and therefore, the complexity of data protection...

    Provided By mecs-press

  • White Papers // Apr 2013

    Defending of IP Spoofing by Ingress Filter in Extended-Inter Domain Packet Key Marking System

    The significance of the Distributed Denial of Service (DDoS) problem and the increased occurrence and strength of attacks has led to the dawn of numerous prevention mechanisms. IP spoofing is most frequently used in denial-of-service attacks. In such attacks, the goal is to flood the victim with overwhelming amounts of...

    Provided By mecs-press

  • White Papers // Apr 2013

    Recent Replica Placement Algorithms in P2P Networks - A Review

    Peer-to-Peer (P2P) systems provide a platform for large internet scale distributed applications with no dedicated infrastructure. In P2P systems, applications are developed by dividing them across individual systems termed peers which take the role of both client as well as server. Popularity of objects in such a system can change...

    Provided By mecs-press

  • White Papers // Apr 2013

    A Novel Routing Scheme for Mobile Ad Hoc Network

    Mobile Ad hoc NETwork (MANET) is a collection of mobile users without any support of fixed infrastructure. The nodes in these networks have several constraints such as transmission power, bandwidth and processing capability. In addition to it an important parameter of interest is the residual battery power of the nodes....

    Provided By mecs-press

  • White Papers // Jun 2013

    A Survey of Adaptive Gateway Discovery Mechanisms in Heterogeneous Networks

    The communication range of devices within a mobile ad hoc network is inherently restricted. One way of enhancing the communication range of a mobile ad hoc network, is to interconnect it to a wired network like the internet, thus forming a heterogeneous wired cum wireless network. This interconnection also enables...

    Provided By mecs-press

  • White Papers // Jun 2013

    Flat-Top Ring-Shaped Cell Design for High-Altitude Platform Communications

    In this paper, the authors propose a new design for ring-shaped cells is introduced where to improve the power distribution and Carrier-to-Interference Ratio (CIR) over the cell area. The designed cell has flat-top radiation pattern with minimal ripples in the service area while the out-of-cell area has lower radiation levels....

    Provided By mecs-press

  • White Papers // Jun 2013

    Adaptive Population Sizing Genetic Algorithm Assisted Maximum Likelihood Detection of OFDM Symbols in the Presence of Nonlinear Distortions

    In this paper, the author's present Adaptive population sizing Genetic Algorithm (AGA) assisted Maximum Likelihood (ML) estimation of Orthogonal Frequency Division Multiplexing (OFDM) symbols in the presence of nonlinear distortions. The proposed algorithm is simulated in MATLAB and compared with existing estimation algorithms such as iterative DAR, decision feedback clipping...

    Provided By mecs-press

  • White Papers // May 2013

    Social Networking for Botnet Command and Control

    A botnet is a group of compromised computers - often a large group - under the command and control of a malicious botmaster. Botnets can be used for a wide variety of malicious attacks, including spamming, distributed denial of service, and identity theft. Botnets are generally recognized as a serious...

    Provided By mecs-press

  • White Papers // Jun 2013

    A New Proposal for Route Finding in Mobile Ad Hoc Networks

    Mobile Ad hoc NETwork (MANET) is a kind of wireless ad-hoc network, and is a self-configuring network of mobile routers (and associated hosts) connected by wireless links - the union of which forms an arbitrary topology. The routers are free to move randomly and organize themselves arbitrarily, thus the network's...

    Provided By mecs-press

  • White Papers // Jul 2014

    A New Classification Scheme for Intrusion Detection Systems

    In today's world, overall global mostly depend on technologies for their information storage and transactions. But this frequent use of online technologies make the data stored exposed to the risk of attacks towards the data in the form of intrusion. In order to save the data from these attacks, the...

    Provided By mecs-press

  • White Papers // Jul 2014

    Optimal Route Based Advanced Algorithm Using Hot Link Split Multi-Path Routing Algorithm

    Present research work describes advancement in standard routing protocol Ad hoc On-demand Distance Vector Routing (AODV) for mobile ad-hoc networks. The author's mechanism sets up multiple optimal paths with the criteria of bandwidth and delay to store multiple optimal paths in the network. At time of link failure, it will...

    Provided By mecs-press

  • White Papers // Jul 2014

    Analysis of Host-Based and Network-Based Intrusion Detection System

    Intrusion Detection Systems (IDS) aim at detecting attacks against computer systems and networks or, in general, against information systems. Its basic aim is to protect the system against malwares and unauthorized access of a network or a system. Intrusion detection is of two type Network-IDS (NIDS) and Host based-IDS (HIDS)....

    Provided By mecs-press

  • White Papers // Jul 2014

    Security, Privacy and Trust Challenges in Cloud Computing and Solutions

    Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. Cloud computing recently emerged as a promising solution to Information Technology (IT) management. IT managers look...

    Provided By mecs-press

  • White Papers // Jul 2014

    Efficient Group Key Management Using Symmetric Key and Threshold Cryptography for Cluster Based Wireless Sensor Networks

    Research in Wireless Sensor Networks (WSNs) has made a significant progress recently, especially the area of key management, which plays a central role for protecting group communication in sensor networks. In sensor networks, the data are crucial and have to keep secrecy in data communication. To achieve data confidentiality, adversary...

    Provided By mecs-press

  • White Papers // Aug 2014

    SM-SIP: Seamless Mobility Management for Heterogeneous Wireless Networks

    Next-Generation wireless Networks (NGN) and Internet of Thing (IoT) become two leaders of designing mobile multimedia services. The deployment of these services using heterogeneous wireless networks will be the important factor that leads to profound change in the way that these services are delivered. Also, how these services will be...

    Provided By mecs-press

  • White Papers // Aug 2014

    Artificial Intrusion Detection Techniques: A Survey

    Networking has become the most integral part of the cyber society. Everyone wants to connect themselves with each other. With the advancement of network technology, the authors find this most vulnerable to breach and take information and once information reaches to the wrong hands it can do terrible things. During...

    Provided By mecs-press

  • White Papers // Aug 2014

    C2DF: High Rate DDOS Filtering Method in Cloud Computing

    Distributed Denial Of Service (DDOS) attacks have become one of the main threats in cloud environment. A DDOS attack can make large scale of damages to resources and access of the resources to genuine cloud users. Old-established defending system cannot be easily applied in cloud computing due to their relatively...

    Provided By mecs-press

  • White Papers // Aug 2014

    Congestion Control in WMSNs by Reducing Congestion and Free Resources to Set Accurate Rates and Priority

    In this paper, the authors focus on mechanism for reducing congestion in the network by free resources to set accurate rates and priority data needs. If two nodes send their packets in the shortest path to the parent node in a crowded place, a source node must prioritize the data...

    Provided By mecs-press