University of Glamorgan

Displaying 1-15 of 15 results

  • White Papers // Mar 2014

    Cache-Aware Parallel Programming for Manycore Processors

    With rapidly evolving technology, multi-core and manycore processors have emerged as promising architectures to benefit from increasing transistor numbers. The transition to-wards these parallel architectures make today an exciting time to investigate challenges in parallel computing. The TILEPro64 is a manycore accelerator, composed of 64 tiles interconnected via multiple 8

    Provided By University of Glamorgan

  • White Papers // Mar 2014

    An Efficient Thread Mapping Strategy for Multiprogramming on Manycore Processors

    The emergence of multi-core and manycore processors is set to change the parallel computing world. Applications are shifting towards increased parallelism in order to utilize these architectures efficiently. This leads to a situation where every application creates its desirable number of threads, based on its parallel nature and the system...

    Provided By University of Glamorgan

  • White Papers // Jun 2013

    Cloud Security Challenges: Investigating Policies, Standards, and Guidelines in a Fortune 500 Organization

    Cloud computing is quickly becoming pervasive in today's globally integrated networks. The cloud offers organizations opportunities to potentially deploy software and data solutions that are accessible through numerous mechanisms, in a multitude of settings, at a reduced cost with increased reliability and scalability. The increasingly pervasive and ubiquitous nature of...

    Provided By University of Glamorgan

  • White Papers // Apr 2013

    Longer is Better: Exploiting Path Diversity in Data Center Networks

    Data Center (DC) networks exhibit much more centralized characteristics than the legacy Internet, yet they are operated by similar distributed routing and control algorithms that fail to exploit topological redundancy to deliver better and more sustainable performance. Multipath protocols, for example, use node-local and heuristic information to only exploit path...

    Provided By University of Glamorgan

  • White Papers // Mar 2013

    Using Smartphones as a Proxy for Forensic Evidence Contained in Cloud Storage Services

    Cloud storage services such as Dropbox, Box and SugarSync have been embraced by both individuals and organizations. This creates an environment that is potentially conducive to security breaches and malicious activities. The investigation of these cloud environments presents new challenges for the digital forensics community. It is anticipated that Smartphone...

    Provided By University of Glamorgan

  • White Papers // Dec 2012

    Towards a Metric for Recognition-Based Graphical Password Security

    Recognition-Based Graphical Password (RBGP) schemes are not easily compared in terms of security. Current research uses many different measures which results in confusion as to whether RBGP schemes are secure against guessing and capture attacks. If it were possible to measure all RBGP schemes in a common way it would...

    Provided By University of Glamorgan

  • White Papers // May 2012

    Design and FPGA Implementation of Frames Detector for SC-FDE/OFDM Millimetre Wave IEEE802.15.3c WPAN

    The millimetre-wave frequency range 57-64 GHz has been already standardised by the IEEE 802.15.3c for Wireless Personal Area Network (WPAN). The specified PHY targets multi-Giga bit per second data rate with two modes, Single-Carrier Frequency Domain Equalization (SC-FDE) and Orthogonal Frequency Division Multiplexing (OFDM), both modulation schemes are based on...

    Provided By University of Glamorgan

  • White Papers // Aug 2011

    Threshold and RAD Analysis of Adjusted Counter-Based Broadcast in MANETs

    The broadcasting protocol can dramatically affect the performance of Mobile Ad Hoc NETworks (MANETs). Proper use of a counter-based scheme can reduce the number of rebroadcasts and hence reduce the chance of contention and collision among neighbouring nodes. While most previous studies have used a fixed counter-based threshold value irrespective...

    Provided By University of Glamorgan

  • White Papers // Aug 2011

    Performance Analysis of an Adaptive Probabilistic Counter-Based Broadcast Scheme for Mobile Ad Hoc Networks

    Flooding is the simplest mechanism for broadcasting in Mobile Ad hoc NETworks (MANETs), where each node retransmits a given broadcast packet exactly once. Despite its simplicity, flooding can result in high redundant retransmission, contention and collision, a phenomenon collectively referred to as the broadcast storm problem. Several probabilistic broadcast schemes...

    Provided By University of Glamorgan

  • White Papers // Aug 2011

    Calm Before the Storm: The Emerging Challenges of Cloud Computing in Digital Forensics

    Cloud computing is a rapidly evolving technological phenomenon. Rather than procure, deploy and manage a physical IT infrastructure to host its software applications, organizations are increasingly deploying the same into remote, virtualized environments, which can be hosted and manage by third party providers. This development in the IT landscape has...

    Provided By University of Glamorgan

  • White Papers // Jun 2011

    Augmenting Password Recovery with Online Profiling

    In investigations involving password-protected artefacts, password recovery can be a daunting task, consuming resources and causing delays in investigations. This paper describes work conducted to examine whether using online publicly available information to generate individual-related electronic profiles reduces automated password recovery time. In order to accomplish this, a web crawler...

    Provided By University of Glamorgan

  • White Papers // Dec 2010

    Penetration Testing and Vulnerability Assessments: A Professional Approach

    Attacks against computer systems and the data contained within these systems are becoming increasingly frequent and evermore sophisticated. So-called "Zero-day" exploits can be purchased on black markets and Advanced Persistent Threats (APTs) can lead to exfiltration of data over extended periods. Organisations wishing to ensure security of their systems may...

    Provided By University of Glamorgan

  • White Papers // Jun 2010

    Security and Computer Forensics in Web Engineering Education

    The integration of security and forensics into web engineering curricula is imperative. Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually. Security is frequently taught as a stand-alone course, assuming that security can be 'Bolted on' to a web application at...

    Provided By University of Glamorgan

  • White Papers // Jan 2010

    Anonymizing Data in a Peer-to-Peer Based Distributed Intrusion Detection System - A Possible Approach

    Over the last decade, Intrusion Detection Systems (IDS) have become increasingly important for the protection of today's networks. However, Enterprise Intrusion Detection Systems nowadays are developed for implementation inside one enterprise but do not assist in the requirements occurring when exchanging data between several organizations. Apart from common issues such...

    Provided By University of Glamorgan

  • White Papers // Nov 2009

    Dynamic Buffer Management for Multimedia QoS in Beyond 3G Wireless Networks

    This paper investigates a dynamic buffer management scheme for QoS control of multimedia services in beyond 3G wireless systems. The scheme is studied in the context of the state-of-the-art 3.5G system i.e. the High Speed Downlink Packet Access (HSDPA) which enhances 3G UMTS to support high-speed packet switched services. Unlike...

    Provided By University of Glamorgan

  • White Papers // Mar 2013

    Using Smartphones as a Proxy for Forensic Evidence Contained in Cloud Storage Services

    Cloud storage services such as Dropbox, Box and SugarSync have been embraced by both individuals and organizations. This creates an environment that is potentially conducive to security breaches and malicious activities. The investigation of these cloud environments presents new challenges for the digital forensics community. It is anticipated that Smartphone...

    Provided By University of Glamorgan

  • White Papers // Aug 2011

    Threshold and RAD Analysis of Adjusted Counter-Based Broadcast in MANETs

    The broadcasting protocol can dramatically affect the performance of Mobile Ad Hoc NETworks (MANETs). Proper use of a counter-based scheme can reduce the number of rebroadcasts and hence reduce the chance of contention and collision among neighbouring nodes. While most previous studies have used a fixed counter-based threshold value irrespective...

    Provided By University of Glamorgan

  • White Papers // Aug 2011

    Performance Analysis of an Adaptive Probabilistic Counter-Based Broadcast Scheme for Mobile Ad Hoc Networks

    Flooding is the simplest mechanism for broadcasting in Mobile Ad hoc NETworks (MANETs), where each node retransmits a given broadcast packet exactly once. Despite its simplicity, flooding can result in high redundant retransmission, contention and collision, a phenomenon collectively referred to as the broadcast storm problem. Several probabilistic broadcast schemes...

    Provided By University of Glamorgan

  • White Papers // Apr 2013

    Longer is Better: Exploiting Path Diversity in Data Center Networks

    Data Center (DC) networks exhibit much more centralized characteristics than the legacy Internet, yet they are operated by similar distributed routing and control algorithms that fail to exploit topological redundancy to deliver better and more sustainable performance. Multipath protocols, for example, use node-local and heuristic information to only exploit path...

    Provided By University of Glamorgan

  • White Papers // Aug 2011

    Calm Before the Storm: The Emerging Challenges of Cloud Computing in Digital Forensics

    Cloud computing is a rapidly evolving technological phenomenon. Rather than procure, deploy and manage a physical IT infrastructure to host its software applications, organizations are increasingly deploying the same into remote, virtualized environments, which can be hosted and manage by third party providers. This development in the IT landscape has...

    Provided By University of Glamorgan

  • White Papers // Jun 2013

    Cloud Security Challenges: Investigating Policies, Standards, and Guidelines in a Fortune 500 Organization

    Cloud computing is quickly becoming pervasive in today's globally integrated networks. The cloud offers organizations opportunities to potentially deploy software and data solutions that are accessible through numerous mechanisms, in a multitude of settings, at a reduced cost with increased reliability and scalability. The increasingly pervasive and ubiquitous nature of...

    Provided By University of Glamorgan

  • White Papers // Jan 2010

    Anonymizing Data in a Peer-to-Peer Based Distributed Intrusion Detection System - A Possible Approach

    Over the last decade, Intrusion Detection Systems (IDS) have become increasingly important for the protection of today's networks. However, Enterprise Intrusion Detection Systems nowadays are developed for implementation inside one enterprise but do not assist in the requirements occurring when exchanging data between several organizations. Apart from common issues such...

    Provided By University of Glamorgan

  • White Papers // Nov 2009

    Dynamic Buffer Management for Multimedia QoS in Beyond 3G Wireless Networks

    This paper investigates a dynamic buffer management scheme for QoS control of multimedia services in beyond 3G wireless systems. The scheme is studied in the context of the state-of-the-art 3.5G system i.e. the High Speed Downlink Packet Access (HSDPA) which enhances 3G UMTS to support high-speed packet switched services. Unlike...

    Provided By University of Glamorgan

  • White Papers // Dec 2010

    Penetration Testing and Vulnerability Assessments: A Professional Approach

    Attacks against computer systems and the data contained within these systems are becoming increasingly frequent and evermore sophisticated. So-called "Zero-day" exploits can be purchased on black markets and Advanced Persistent Threats (APTs) can lead to exfiltration of data over extended periods. Organisations wishing to ensure security of their systems may...

    Provided By University of Glamorgan

  • White Papers // May 2012

    Design and FPGA Implementation of Frames Detector for SC-FDE/OFDM Millimetre Wave IEEE802.15.3c WPAN

    The millimetre-wave frequency range 57-64 GHz has been already standardised by the IEEE 802.15.3c for Wireless Personal Area Network (WPAN). The specified PHY targets multi-Giga bit per second data rate with two modes, Single-Carrier Frequency Domain Equalization (SC-FDE) and Orthogonal Frequency Division Multiplexing (OFDM), both modulation schemes are based on...

    Provided By University of Glamorgan

  • White Papers // Jun 2010

    Security and Computer Forensics in Web Engineering Education

    The integration of security and forensics into web engineering curricula is imperative. Poor security in web-based applications is continuing to cost organizations millions and the losses are still increasing annually. Security is frequently taught as a stand-alone course, assuming that security can be 'Bolted on' to a web application at...

    Provided By University of Glamorgan

  • White Papers // Jun 2011

    Augmenting Password Recovery with Online Profiling

    In investigations involving password-protected artefacts, password recovery can be a daunting task, consuming resources and causing delays in investigations. This paper describes work conducted to examine whether using online publicly available information to generate individual-related electronic profiles reduces automated password recovery time. In order to accomplish this, a web crawler...

    Provided By University of Glamorgan

  • White Papers // Dec 2012

    Towards a Metric for Recognition-Based Graphical Password Security

    Recognition-Based Graphical Password (RBGP) schemes are not easily compared in terms of security. Current research uses many different measures which results in confusion as to whether RBGP schemes are secure against guessing and capture attacks. If it were possible to measure all RBGP schemes in a common way it would...

    Provided By University of Glamorgan

  • White Papers // Mar 2014

    Cache-Aware Parallel Programming for Manycore Processors

    With rapidly evolving technology, multi-core and manycore processors have emerged as promising architectures to benefit from increasing transistor numbers. The transition to-wards these parallel architectures make today an exciting time to investigate challenges in parallel computing. The TILEPro64 is a manycore accelerator, composed of 64 tiles interconnected via multiple 8

    Provided By University of Glamorgan

  • White Papers // Mar 2014

    An Efficient Thread Mapping Strategy for Multiprogramming on Manycore Processors

    The emergence of multi-core and manycore processors is set to change the parallel computing world. Applications are shifting towards increased parallelism in order to utilize these architectures efficiently. This leads to a situation where every application creates its desirable number of threads, based on its parallel nature and the system...

    Provided By University of Glamorgan