Showing 181–192 of 207 results

  • Security, Privacy, and Access Control in Information-Centric Networking: A Survey

    Security, Privacy, and Access Control in Information-Centric Networking: A Survey

    0 out of 5
    4,500

    Security, Privacy, and Access Control in Information-Centric Networking: A Survey Abstract-Information-Centric Networking (ICN) replaces the widely used host-centric networking paradigm in communication networks (e.g., Internet and mobile ad hoc networks) with an information-centric paradigm, which prioritizes the delivery of named content, oblivious of the contents? origin. Content and client security, provenance, and identity privacy are…

  • Semantic security against web application attacks

    Semantic security against web application attacks

    0 out of 5
    4,500

    Semantic security against web application attacks Abstract? Semantic security against web application attacks. Timeout mechanisms are a useful feature for web applications. However, these mechanisms need to be used with care because, if used as-is, they are vulnerable to timing attacks. This paper focuses on internal timing attacks, a particularly dangerous class of timing attacks,…

  • SentiHealth-Cancer: A sentiment analysis tool to help detecting moodof patients in online social networks

    SentiHealth-Cancer: A sentiment analysis tool to help detecting moodof patients in online social networks

    0 out of 5
    5,500

    SentiHealth-Cancer: A sentiment analysis tool to help detecting moodof patients in online social networks Abstract?Abstract Cancer is a critical disease that affects millions of people and families around the world. In2012 about 14.1 million new cases of cancer occurred globally. Because of many reasons like the severityof some cases, the side effects of some treatments…

  • Sharing of Patient confidential data using ECG steganography

    Sharing of Patient confidential data using ECG steganography

    0 out of 5
    4,500

    Sharing of Patient confidential data using ECG steganography Abstract?Sharing of Patient confidential data using ECG steganography. The number of aging population are growing significantly. In accordance with Health Insurance Portability and Accountability Act (HIPAA) the patient’s privacy and security is important in the protection of healthcare privacy. Point-Of-care (PoC) is an application used in hospitals…

  • Simple T wave metrics may better predict early  is schema as compared to ST segment

    Simple T wave metrics may better predict early is schema as compared to ST segment

    0 out of 5
    5,500

    Simple T wave metrics may better predict early is schema as compared to ST segment Abstract?Abstract Recently, security issues are obstructing the development and using of cloud computing services. Authentication plays an important role in the cloud security, and numerous concerns have been raised to prevent an unauthorized users to access the entities? resources (sender…

  • SIP Flooding Attack Detection with a Multi-Dimensional Sketch Design

    SIP Flooding Attack Detection with a Multi-Dimensional Sketch Design

    0 out of 5
    4,500

    SIP Flooding Attack Detection with a Multi-Dimensional Sketch Design Abstract?SIP Flooding Attack Detection with a Multi-Dimensional Sketch Design. The session initiation protocol (SIP) is widely used for controlling multimedia communication sessions over the Internet Protocol (IP). Effectively detecting a flooding attack to the SIP proxy server is critical to ensure robust multimedia communications over the…

  • SmartCrawler: A Two-Stage Crawler for Efficiently Harvesting Deep-Web Interfaces

    SmartCrawler: A Two-Stage Crawler for Efficiently Harvesting Deep-Web Interfaces

    0 out of 5
    5,500

    SmartCrawler: A Two-Stage Crawler for Efficiently Harvesting Deep-Web Interfaces Abstract? As deep web grows at a very fast pace, there has been increased interest in techniques that help efficiently locate deep-web interfaces. However, due to the large volume of web resources and the dynamic nature of deep web, achieving wide coverage and high efficiency is…

  • SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces

    SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces

    0 out of 5
    4,500

    SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces Abstract? SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces. As deep web grows at a very fast pace, there has been increased interest in techniques that help ef?ciently locate deep-web interfaces. However, due to the large volume of web resources and the dynamic nature of…

  • Software piracy protection

    Software piracy protection

    0 out of 5
    5,500

    Software piracy protection Abstract? Software piracy has been major issue for software industries. They have to pay a very large amount to protect their applications. There are several insurance schemes for the protection of software. But they all are very costly and provide services for a limited period of time. This paper will demonstrate a…

  • SPA: A Secure and Private Auction Framework for Decentralized Online Social Networks

    SPA: A Secure and Private Auction Framework for Decentralized Online Social Networks

    0 out of 5
    4,500

    SPA: A Secure and Private Auction Framework for Decentralized Online Social Networks Abstract? SPA: A Secure and Private Auction Framework for Decentralized Online Social Networks. The security and privacy threats on e-commerce have attracted intensive attention recently. The explosive growth of online social networks OSNs < Final Year Projects 2016 > has made them potential…

  • SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks

    SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks

    0 out of 5
    4,500

    SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks Abstract? SPAM: A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File…

  • Spatiotemporal Data Gathering Based on Compressive Sensing in WSNs

    Spatiotemporal Data Gathering Based on Compressive Sensing in WSNs

    0 out of 5
    4,500

    Spatiotemporal Data Gathering Based on Compressive Sensing in WSNs Abstract-In wireless sensor networks (WSNs), sensor readings have spatiotemporal correlation, and wireless links are unreliable. To balance the energy-performance trade-off and reduce the impact of packet loss, a novel approach is proposed that combines Kronecker compressed sensing (KCS) and cluster topology to exploit spatial and temporal…

End of content

End of content