National University of Computer and Emerging Sciences

Displaying 1-10 of 10 results

  • White Papers // Jan 2014

    Monotone Data Visualization Using Rational Trigonometric Spline Interpolation

    In this paper, rational cubic and bicubic trigonometric schemes are developed to conserve monotonicity of curve and surface data respectively. The rational cubic function has four parameters in each subinterval, while, the rational bicubic partially blended function has eight parameters in each rectangular patch. The monotonicity of curve and surface...

    Provided By National University of Computer and Emerging Sciences

  • White Papers // Feb 2011

    In-Execution Malware Detection Using Task Structures of Linux Processes

    In this paper, the authors present a novel framework - it uses the information in kernel structures of a process - to do run-time analysis of the behavior of an executing program. Their analysis shows that classifying a process as malicious or benign - using the information in the kernel...

    Provided By National University of Computer and Emerging Sciences

  • White Papers // Feb 2011

    ELF-Miner: Using Structural Knowledge and Data Mining for Detecting Linux Malicious Executables

    Linux malware can pose a significant threat - its (Linux) penetration is exponentially increasing - because little is known or understood about its vulnerabilities. The authors believe that now is the right time to devise non-signature based zero-day (previously unknown) malware detection strategies before Linux intruders take them by surprise....

    Provided By National University of Computer and Emerging Sciences

  • White Papers // Jun 2010

    SMS SPAM Detection by Operating on Byte-Level Distributions Using Hidden Markov Models (HMMs)

    The volume of spam SMS received by mobile users has increased dramatically in recent years. SMS provides a perfect model for spam and is widely exploited through arbitrary advertising campaigns and propagation of scam schemes. The increasing threat can be controlled through efficient and robust filtering systems. Filtering of SMS...

    Provided By National University of Computer and Emerging Sciences

  • White Papers // Jun 2010

    Clustering Unstructured Data (Flat Files) - An Implementation in Text Mining Tool

    With the advancement of technology and reduced storage costs, individuals and organizations are tending towards the usage of electronic media for storing textual information and documents. It is time consuming for readers to retrieve relevant information from unstructured document collection. It is easier and less time consuming to find documents...

    Provided By National University of Computer and Emerging Sciences

  • White Papers // Mar 2010

    Weighted Clustering Using Comprehensive Learning Particle Swarm Optimization for Mobile Ad Hoc Networks

    A mobile Ad-hoc network consists of dynamic nodes that can move freely. These nodes communicate with each other without a base station. In this paper, the authors propose a Comprehensive Learning Particle Swarm Optimization (CLPSO) based clustering algorithm for mobile ad hoc networks. It has the ability to find the...

    Provided By National University of Computer and Emerging Sciences

  • White Papers // Dec 2009

    Optical Wireless Communication and Recharging Mechanism of Wireless Sensor Network by Using CCRs

    Broad spectrum of optical wireless communication is available, which can fulfill the requirements of high speed wireless communication. This is the basic advantage of optical wireless communication over conventional wireless communication technologies. The other important thing is the day by day decreasing size of wireless sensors with the advent of...

    Provided By National University of Computer and Emerging Sciences

  • White Papers // Aug 2009

    Evaluating DoS Attacks Against SIP-Based VoIP Systems

    The multimedia communication is rapidly converging towards Voice over Internet - commonly known as Voice over Internet Protocol (VoIP). Session Initiation Protocol (SIP) is the standard used for session signaling in VoIP. Crafty attackers can launch a number of Denial of Service (DoS) attacks on a SIP based VoIP infrastructure...

    Provided By National University of Computer and Emerging Sciences

  • White Papers // Jun 2009

    Distortion Estimation in Digital Image Watermarking Using Genetic Programming

    This paper introduces a technique of distortion estimation in image watermarking using Genetic Programming (GP). The distortion is estimated by considering the problem of obtaining a distorted watermarked signal from the original watermarked signal as a function regression problem. This function regression problem is solved using GP, where the original...

    Provided By National University of Computer and Emerging Sciences

  • White Papers // Aug 2008

    Embedded Malware Detection using Markovian Statistical Model of Benign Files

    Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. This hidden malcode can be remotely executed using a simple trigger program. It has been shown that embedded malware is not detected by commercial antivirus software even when the malware signature is...

    Provided By National University of Computer and Emerging Sciences

  • White Papers // Jun 2010

    SMS SPAM Detection by Operating on Byte-Level Distributions Using Hidden Markov Models (HMMs)

    The volume of spam SMS received by mobile users has increased dramatically in recent years. SMS provides a perfect model for spam and is widely exploited through arbitrary advertising campaigns and propagation of scam schemes. The increasing threat can be controlled through efficient and robust filtering systems. Filtering of SMS...

    Provided By National University of Computer and Emerging Sciences

  • White Papers // Dec 2009

    Optical Wireless Communication and Recharging Mechanism of Wireless Sensor Network by Using CCRs

    Broad spectrum of optical wireless communication is available, which can fulfill the requirements of high speed wireless communication. This is the basic advantage of optical wireless communication over conventional wireless communication technologies. The other important thing is the day by day decreasing size of wireless sensors with the advent of...

    Provided By National University of Computer and Emerging Sciences

  • White Papers // Jun 2009

    Distortion Estimation in Digital Image Watermarking Using Genetic Programming

    This paper introduces a technique of distortion estimation in image watermarking using Genetic Programming (GP). The distortion is estimated by considering the problem of obtaining a distorted watermarked signal from the original watermarked signal as a function regression problem. This function regression problem is solved using GP, where the original...

    Provided By National University of Computer and Emerging Sciences

  • White Papers // Mar 2010

    Weighted Clustering Using Comprehensive Learning Particle Swarm Optimization for Mobile Ad Hoc Networks

    A mobile Ad-hoc network consists of dynamic nodes that can move freely. These nodes communicate with each other without a base station. In this paper, the authors propose a Comprehensive Learning Particle Swarm Optimization (CLPSO) based clustering algorithm for mobile ad hoc networks. It has the ability to find the...

    Provided By National University of Computer and Emerging Sciences

  • White Papers // Feb 2011

    In-Execution Malware Detection Using Task Structures of Linux Processes

    In this paper, the authors present a novel framework - it uses the information in kernel structures of a process - to do run-time analysis of the behavior of an executing program. Their analysis shows that classifying a process as malicious or benign - using the information in the kernel...

    Provided By National University of Computer and Emerging Sciences

  • White Papers // Feb 2011

    ELF-Miner: Using Structural Knowledge and Data Mining for Detecting Linux Malicious Executables

    Linux malware can pose a significant threat - its (Linux) penetration is exponentially increasing - because little is known or understood about its vulnerabilities. The authors believe that now is the right time to devise non-signature based zero-day (previously unknown) malware detection strategies before Linux intruders take them by surprise....

    Provided By National University of Computer and Emerging Sciences

  • White Papers // Jun 2010

    Clustering Unstructured Data (Flat Files) - An Implementation in Text Mining Tool

    With the advancement of technology and reduced storage costs, individuals and organizations are tending towards the usage of electronic media for storing textual information and documents. It is time consuming for readers to retrieve relevant information from unstructured document collection. It is easier and less time consuming to find documents...

    Provided By National University of Computer and Emerging Sciences

  • White Papers // Aug 2008

    Embedded Malware Detection using Markovian Statistical Model of Benign Files

    Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. This hidden malcode can be remotely executed using a simple trigger program. It has been shown that embedded malware is not detected by commercial antivirus software even when the malware signature is...

    Provided By National University of Computer and Emerging Sciences

  • White Papers // Jan 2014

    Monotone Data Visualization Using Rational Trigonometric Spline Interpolation

    In this paper, rational cubic and bicubic trigonometric schemes are developed to conserve monotonicity of curve and surface data respectively. The rational cubic function has four parameters in each subinterval, while, the rational bicubic partially blended function has eight parameters in each rectangular patch. The monotonicity of curve and surface...

    Provided By National University of Computer and Emerging Sciences

  • White Papers // Aug 2009

    Evaluating DoS Attacks Against SIP-Based VoIP Systems

    The multimedia communication is rapidly converging towards Voice over Internet - commonly known as Voice over Internet Protocol (VoIP). Session Initiation Protocol (SIP) is the standard used for session signaling in VoIP. Crafty attackers can launch a number of Denial of Service (DoS) attacks on a SIP based VoIP infrastructure...

    Provided By National University of Computer and Emerging Sciences