Security, Privacy, and Access Control in Information-Centric Networking: A Survey Abstract-Information-Centric Networking (ICN) replaces the widely used host-centric networking paradigm in communication networks (e.g., Internet and mobile ad hoc networks) with an information-centric paradigm, which prioritizes the delivery of named content, oblivious of the contents? origin. Content and client security, provenance, and identity privacy are…
Semantic security against web application attacks Abstract? Semantic security against web application attacks. Timeout mechanisms are a useful feature for web applications. However, these mechanisms need to be used with care because, if used as-is, they are vulnerable to timing attacks. This paper focuses on internal timing attacks, a particularly dangerous class of timing attacks,…
SentiHealth-Cancer: A sentiment analysis tool to help detecting moodof patients in online social networks Abstract?Abstract Cancer is a critical disease that affects millions of people and families around the world. In2012 about 14.1 million new cases of cancer occurred globally. Because of many reasons like the severityof some cases, the side effects of some treatments…
Sharing of Patient confidential data using ECG steganography Abstract?Sharing of Patient confidential data using ECG steganography. The number of aging population are growing significantly. In accordance with Health Insurance Portability and Accountability Act (HIPAA) the patient’s privacy and security is important in the protection of healthcare privacy. Point-Of-care (PoC) is an application used in hospitals…
Simple T wave metrics may better predict early is schema as compared to ST segment Abstract?Abstract Recently, security issues are obstructing the development and using of cloud computing services. Authentication plays an important role in the cloud security, and numerous concerns have been raised to prevent an unauthorized users to access the entities? resources (sender…
SIP Flooding Attack Detection with a Multi-Dimensional Sketch Design Abstract?SIP Flooding Attack Detection with a Multi-Dimensional Sketch Design. The session initiation protocol (SIP) is widely used for controlling multimedia communication sessions over the Internet Protocol (IP). Effectively detecting a flooding attack to the SIP proxy server is critical to ensure robust multimedia communications over the…
SmartCrawler: A Two-Stage Crawler for Efficiently Harvesting Deep-Web Interfaces Abstract? As deep web grows at a very fast pace, there has been increased interest in techniques that help efficiently locate deep-web interfaces. However, due to the large volume of web resources and the dynamic nature of deep web, achieving wide coverage and high efficiency is…
SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces Abstract? SmartCrawler: A Two-stage Crawler for Efficiently Harvesting Deep-Web Interfaces. As deep web grows at a very fast pace, there has been increased interest in techniques that help ef?ciently locate deep-web interfaces. However, due to the large volume of web resources and the dynamic nature of…
Software piracy protection Abstract? Software piracy has been major issue for software industries. They have to pay a very large amount to protect their applications. There are several insurance schemes for the protection of software. But they all are very costly and provide services for a limited period of time. This paper will demonstrate a…
SPA: A Secure and Private Auction Framework for Decentralized Online Social Networks Abstract? SPA: A Secure and Private Auction Framework for Decentralized Online Social Networks. The security and privacy threats on e-commerce have attracted intensive attention recently. The explosive growth of online social networks OSNs < Final Year Projects 2016 > has made them potential…
Spatiotemporal Data Gathering Based on Compressive Sensing in WSNs Abstract-In wireless sensor networks (WSNs), sensor readings have spatiotemporal correlation, and wireless links are unreliable. To balance the energy-performance trade-off and reduce the impact of packet loss, a novel approach is proposed that combines Kronecker compressed sensing (KCS) and cluster topology to exploit spatial and temporal…