University of Bedfordshire

Displaying 1-11 of 11 results

  • White Papers // Oct 2012

    Application of Forensic Analysis for Intrusion Detection Against Ddos Attacks in Mobile Ad Hoc Networks

    In this paper, the authors address a specific approach to resolving the problem of intrusion detection against Distributed Denial of Service (DDoS) attacks in Mobile Ad-hoc NETworks (MANET). The main function of an Intrusion Detection System (IDS) is to inspect the network for malicious activities, policy violations and security loopholes...

    Provided By University of Bedfordshire

  • White Papers // Mar 2012

    The Impact of Mobility Patterns on MANET Vulnerability to DDoS Attacks

    A Mobile Ad-hoc NETwork (MANET) is a multi-hop, wireless, self-configuring network that can be formed without the need of any pre-established infrastructure or centralized administration. All nodes in the network act at the same time as hosts and packet-forwarding routers. Wireless links, node mobility and lack of central administration make...

    Provided By University of Bedfordshire

  • White Papers // May 2011

    Cluster Management and Implementation of Innovative Information Technologies

    The concept of clusters has been accepted as one possible solution for the survival of small and medium enterprises, as well as driving innovation and economic development. Since clusters can involve a large number of different subjects, it is crucial to the successful development of information systems and linking partners...

    Provided By University of Bedfordshire

  • White Papers // Mar 2011

    Balancing The Leadership Equation - Good Organization And Holding Leaders To Account

    Leadership studies invariably focus on only part of the leadership equation. Studies generally cover individual leaders, particularly those at the top of an organization. They are prone to ignore an important part of the leadership equation - the context in which a person has to lead. Furthermore leadership is needed...

    Provided By University of Bedfordshire

  • White Papers // Mar 2011

    Reflexivity - An Innovative Leadership Research Methodology And An Ongoing Means To Develop Personal Effectiveness

    This paper offers an innovative way to consider leadership that is both relevant to the leadership research community and as a means to enquire and develop one's own personal practice. Instead of focusing on abstract themes, in which their context are often absent, here the author has argued that it...

    Provided By University of Bedfordshire

  • White Papers // Jan 2010

    A Survey on MPEG-4 Standard and Digital Television Deployment

    MPEG-4 standard has been developed to support a wide range of multimedia applications. It provides users a new level of interaction with visual contents, including techniques to view, access and manipulate objects rather than pixels with great error robustness at a wide range of bitrates. The object-based representation paradigm make...

    Provided By University of Bedfordshire

  • White Papers // Dec 2009

    Intracell Handover for Interference and Handover Mitigation in OFDMA Two-Tier Macrocell-Femtocell Networks

    There are two main access policies (open and closed) to Femtocell Access Points (FAPs), being closed access the customers favorite. However, closed access is the root cause of crosstier interference in cochannel deployments of two-tier networks (i.e., macrocells and femtocells). Further, the effect of this problem is remarkably serious in...

    Provided By University of Bedfordshire

  • White Papers // Jun 2009

    Towards a Language for Rule-Enhanced Business Process Modeling

    Business process modeling is a commonly used approach in the development of service-oriented architectures. The previous research on this topic demonstrated that process-oriented models might be too rigid for dynamic adaptations of the business logic. Rule-based approaches are considered an alternative, which offers more flexibility thanks to the declarative nature...

    Provided By University of Bedfordshire

  • White Papers // May 2009

    Reducing e-Commerce Risks Using Digital Certificates

    E-commerce means buying and selling goods and services across the internet. Secured communication in e-commerce, across unsecured medium, such as the internet, represents one of the major components in a domain of providing necessary security-critical demands, so the flow of information could go in a secure way. The internet, as...

    Provided By University of Bedfordshire

  • White Papers // Apr 2008

    An Intrusion Prevention System as a Proactive Security Mechanism in Network Infrastructure

    A properly configured firewall is a good starting point in securing a computer network. However, complex network environments that involve higher number of participants and endpoints require better security infrastructure. Intrusion Detection Systems (IDS), proposed as a solution to perimeter defense, have many open problems and it is clear that...

    Provided By University of Bedfordshire

  • White Papers // Feb 2007

    A Case Study in Enterprise Modelling for Interoperable Cross-Enterprise Data Exchange

    In this paper, the authors describe an approach to validate the capability of the ATHENA-enhanced enterprise modeling solutions to capture necessary cross-organizational business information in a computable form and to exchange partial models using a proposed common meta-model. The basis for the validation is the Electronic Kanban replenishment process and...

    Provided By University of Bedfordshire

  • White Papers // Mar 2011

    Balancing The Leadership Equation - Good Organization And Holding Leaders To Account

    Leadership studies invariably focus on only part of the leadership equation. Studies generally cover individual leaders, particularly those at the top of an organization. They are prone to ignore an important part of the leadership equation - the context in which a person has to lead. Furthermore leadership is needed...

    Provided By University of Bedfordshire

  • White Papers // Mar 2011

    Reflexivity - An Innovative Leadership Research Methodology And An Ongoing Means To Develop Personal Effectiveness

    This paper offers an innovative way to consider leadership that is both relevant to the leadership research community and as a means to enquire and develop one's own personal practice. Instead of focusing on abstract themes, in which their context are often absent, here the author has argued that it...

    Provided By University of Bedfordshire

  • White Papers // Dec 2009

    Intracell Handover for Interference and Handover Mitigation in OFDMA Two-Tier Macrocell-Femtocell Networks

    There are two main access policies (open and closed) to Femtocell Access Points (FAPs), being closed access the customers favorite. However, closed access is the root cause of crosstier interference in cochannel deployments of two-tier networks (i.e., macrocells and femtocells). Further, the effect of this problem is remarkably serious in...

    Provided By University of Bedfordshire

  • White Papers // Mar 2012

    The Impact of Mobility Patterns on MANET Vulnerability to DDoS Attacks

    A Mobile Ad-hoc NETwork (MANET) is a multi-hop, wireless, self-configuring network that can be formed without the need of any pre-established infrastructure or centralized administration. All nodes in the network act at the same time as hosts and packet-forwarding routers. Wireless links, node mobility and lack of central administration make...

    Provided By University of Bedfordshire

  • White Papers // Oct 2012

    Application of Forensic Analysis for Intrusion Detection Against Ddos Attacks in Mobile Ad Hoc Networks

    In this paper, the authors address a specific approach to resolving the problem of intrusion detection against Distributed Denial of Service (DDoS) attacks in Mobile Ad-hoc NETworks (MANET). The main function of an Intrusion Detection System (IDS) is to inspect the network for malicious activities, policy violations and security loopholes...

    Provided By University of Bedfordshire

  • White Papers // Jun 2009

    Towards a Language for Rule-Enhanced Business Process Modeling

    Business process modeling is a commonly used approach in the development of service-oriented architectures. The previous research on this topic demonstrated that process-oriented models might be too rigid for dynamic adaptations of the business logic. Rule-based approaches are considered an alternative, which offers more flexibility thanks to the declarative nature...

    Provided By University of Bedfordshire

  • White Papers // Feb 2007

    A Case Study in Enterprise Modelling for Interoperable Cross-Enterprise Data Exchange

    In this paper, the authors describe an approach to validate the capability of the ATHENA-enhanced enterprise modeling solutions to capture necessary cross-organizational business information in a computable form and to exchange partial models using a proposed common meta-model. The basis for the validation is the Electronic Kanban replenishment process and...

    Provided By University of Bedfordshire

  • White Papers // May 2011

    Cluster Management and Implementation of Innovative Information Technologies

    The concept of clusters has been accepted as one possible solution for the survival of small and medium enterprises, as well as driving innovation and economic development. Since clusters can involve a large number of different subjects, it is crucial to the successful development of information systems and linking partners...

    Provided By University of Bedfordshire

  • White Papers // Apr 2008

    An Intrusion Prevention System as a Proactive Security Mechanism in Network Infrastructure

    A properly configured firewall is a good starting point in securing a computer network. However, complex network environments that involve higher number of participants and endpoints require better security infrastructure. Intrusion Detection Systems (IDS), proposed as a solution to perimeter defense, have many open problems and it is clear that...

    Provided By University of Bedfordshire

  • White Papers // May 2009

    Reducing e-Commerce Risks Using Digital Certificates

    E-commerce means buying and selling goods and services across the internet. Secured communication in e-commerce, across unsecured medium, such as the internet, represents one of the major components in a domain of providing necessary security-critical demands, so the flow of information could go in a secure way. The internet, as...

    Provided By University of Bedfordshire

  • White Papers // Jan 2010

    A Survey on MPEG-4 Standard and Digital Television Deployment

    MPEG-4 standard has been developed to support a wide range of multimedia applications. It provides users a new level of interaction with visual contents, including techniques to view, access and manipulate objects rather than pixels with great error robustness at a wide range of bitrates. The object-based representation paradigm make...

    Provided By University of Bedfordshire