University of North Carolina at Charlotte

Displaying 1-9 of 9 results

  • White Papers // May 2013

    Big Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning

    In this paper, the authors focus on the specific problem of Big Data classification of network intrusion traffic. It discusses the system challenges presented by the big data problems associated with network intrusion prediction. The prediction of a possible intrusion attack in a network requires continuous collection of traffic data...

    Provided By University of North Carolina at Charlotte

  • White Papers // May 2013

    Encrypted Secret Sharing and Analysis by Plaintext Randomization

    In this paper, the authors consider the problem of secret sharing where shares are encrypted using a Public-Key Encryption (PKE) scheme and cipher-texts are publicly available. While intuition tells the user that the secret should be protected if the PKE is secure against Chosen-Cipher-text Attacks (i.e., CCA-secure), formally proving this...

    Provided By University of North Carolina at Charlotte

  • White Papers // May 2012

    An On-line Relay Selection Scheme in Power Controllable Wireless Sensor Networks

    The authors propose a data forwarding scheme termed Dynamic Energy-based Relaying (DER) for Wireless Sensor Networks (WSNs). In the DER scheme, all nodes try to forward their data packets toward the nodes that are optimal distance closer to the data sink. They also take the relaying node estimated lifetime into...

    Provided By University of North Carolina at Charlotte

  • White Papers // Jan 2012

    Fingerprinting Large Data Sets Through Memory De-Duplication Technique in Virtual Machines

    Because of intellectual property, user privacy, and several other reasons, many scientific and military projects choose to hide the information about the data sets that the authors are using for analysis and computation. Attackers have designed various mechanisms to compromise the operating system or database management system to steal such...

    Provided By University of North Carolina at Charlotte

  • White Papers // Jan 2012

    Non-Normalizable Functions: A New Method to Generate Metamorphic Malware

    To successfully identify the metamorphic viruses oriented from the same base, anti-virus software has adopted the code normalization technique to transform the variations to a more uniform signature representation. Current code normalization technique focuses on the simplification of the arithmetical or logical operators. In this paper, the authors introduce a...

    Provided By University of North Carolina at Charlotte

  • White Papers // Oct 2011

    Forced Collision: Detecting Wormhole Attacks With Physical Layer Network Coding

    Previous research on security of network coding focused on the protection of data dissemination procedures and the detection of malicious activities such as pollution attacks. The capabilities of network coding to detect other attacks have not been fully explored. In this paper, the authors propose a new mechanism based on...

    Provided By University of North Carolina at Charlotte

  • White Papers // Jun 2010

    Sybil Attack Detection Through Global Topology Pattern Visualization

    The authors present a robust intrusion detection approach for wireless networks based on a new multi-matrix visualization method with a set of pattern generation, evaluation, organization, and interaction functions. Their approach concentrates on assisting users to analyze statistical network topology patterns that could expose significant attack features. Specifically, they investigate...

    Provided By University of North Carolina at Charlotte

  • White Papers // Jan 2010

    A Secure Agent Architecture for Sensor Networks

    Advances in sensor and wireless technologies will enable thousands, or even millions of small but smart sensors to be deployed for a wide range of monitoring applications. The sensor networks must be dynamically configurable and adaptive in order to response actively to events. Security must also be built into sensor...

    Provided By University of North Carolina at Charlotte

  • White Papers // Apr 2009

    Proposed University Of North Carolina Flexible Scheduling Policy

    The university system supports the use of flexible work scheduling (or flex-time) to help diminish the computing costs for its employees and to promote conservation of natural resources. The availability of flexible work schedules is not intended to change the department's regular hours of operation or to alter the responsibility...

    Provided By University of North Carolina at Charlotte

  • White Papers // Jun 2010

    Sybil Attack Detection Through Global Topology Pattern Visualization

    The authors present a robust intrusion detection approach for wireless networks based on a new multi-matrix visualization method with a set of pattern generation, evaluation, organization, and interaction functions. Their approach concentrates on assisting users to analyze statistical network topology patterns that could expose significant attack features. Specifically, they investigate...

    Provided By University of North Carolina at Charlotte

  • White Papers // Jan 2012

    Fingerprinting Large Data Sets Through Memory De-Duplication Technique in Virtual Machines

    Because of intellectual property, user privacy, and several other reasons, many scientific and military projects choose to hide the information about the data sets that the authors are using for analysis and computation. Attackers have designed various mechanisms to compromise the operating system or database management system to steal such...

    Provided By University of North Carolina at Charlotte

  • White Papers // Jan 2012

    Non-Normalizable Functions: A New Method to Generate Metamorphic Malware

    To successfully identify the metamorphic viruses oriented from the same base, anti-virus software has adopted the code normalization technique to transform the variations to a more uniform signature representation. Current code normalization technique focuses on the simplification of the arithmetical or logical operators. In this paper, the authors introduce a...

    Provided By University of North Carolina at Charlotte

  • White Papers // May 2012

    An On-line Relay Selection Scheme in Power Controllable Wireless Sensor Networks

    The authors propose a data forwarding scheme termed Dynamic Energy-based Relaying (DER) for Wireless Sensor Networks (WSNs). In the DER scheme, all nodes try to forward their data packets toward the nodes that are optimal distance closer to the data sink. They also take the relaying node estimated lifetime into...

    Provided By University of North Carolina at Charlotte

  • White Papers // Jan 2010

    A Secure Agent Architecture for Sensor Networks

    Advances in sensor and wireless technologies will enable thousands, or even millions of small but smart sensors to be deployed for a wide range of monitoring applications. The sensor networks must be dynamically configurable and adaptive in order to response actively to events. Security must also be built into sensor...

    Provided By University of North Carolina at Charlotte

  • White Papers // Apr 2009

    Proposed University Of North Carolina Flexible Scheduling Policy

    The university system supports the use of flexible work scheduling (or flex-time) to help diminish the computing costs for its employees and to promote conservation of natural resources. The availability of flexible work schedules is not intended to change the department's regular hours of operation or to alter the responsibility...

    Provided By University of North Carolina at Charlotte

  • White Papers // Oct 2011

    Forced Collision: Detecting Wormhole Attacks With Physical Layer Network Coding

    Previous research on security of network coding focused on the protection of data dissemination procedures and the detection of malicious activities such as pollution attacks. The capabilities of network coding to detect other attacks have not been fully explored. In this paper, the authors propose a new mechanism based on...

    Provided By University of North Carolina at Charlotte

  • White Papers // May 2013

    Big Data Classification: Problems and Challenges in Network Intrusion Prediction with Machine Learning

    In this paper, the authors focus on the specific problem of Big Data classification of network intrusion traffic. It discusses the system challenges presented by the big data problems associated with network intrusion prediction. The prediction of a possible intrusion attack in a network requires continuous collection of traffic data...

    Provided By University of North Carolina at Charlotte

  • White Papers // May 2013

    Encrypted Secret Sharing and Analysis by Plaintext Randomization

    In this paper, the authors consider the problem of secret sharing where shares are encrypted using a Public-Key Encryption (PKE) scheme and cipher-texts are publicly available. While intuition tells the user that the secret should be protected if the PKE is secure against Chosen-Cipher-text Attacks (i.e., CCA-secure), formally proving this...

    Provided By University of North Carolina at Charlotte