Showing 1009–1020 of 1036 results

  • Unsupervised traffic classification using flow statistical properties and IP packet payload

    Unsupervised traffic classification using flow statistical properties and IP packet payload

    0 out of 5
    4,500

    Unsupervised traffic classification using flow statistical properties and IP packet payload. The researchers have started looking for Internet traffic recognition techniques that are independent of `well known’ TCP or UDP port numbers or interpreting the contents of packet payloads. Newer approaches classify traffic by recognizing statistical patterns in externally observable attributes of the traffic (such…

  • User-Defined Privacy Grid System for Continuous Location-Based Services

    User-Defined Privacy Grid System for Continuous Location-Based Services

    0 out of 5
    4,500

    User-Defined Privacy Grid System for Continuous Location-Based Services Abstract? User-Defined Privacy Grid System for Continuous Location-Based Services. Location-based services < Final Year Projects 2016 > require users to continuously report their location to a potentially untrusted serverto obtain services based on their location, which can expose them to privacy risks. Unfortunately, existing privacy-preserving techniques for…

  • User-Defined Privacy Grid System for Continuous Location-Based Services

    User-Defined Privacy Grid System for Continuous Location-Based Services

    0 out of 5
    4,500

    User-Defined Privacy Grid System for Continuous Location-Based Services Abstract? User-Defined Privacy Grid System for Continuous Location-Based Services. Location-based services < Final Year Projects 2016 > require users to continuously report their location to a potentially untrusted server to obtain services based on their location, which can expose them to privacy risks. Unfortunately, existing privacy-preserving techniques…

  • Using Ant Colony System to Consolidate Multiple Web Applications in a Cloud Environment

    Using Ant Colony System to Consolidate Multiple Web Applications in a Cloud Environment

    0 out of 5
    4,500

    Using Ant Colony System to Consolidate Multiple Web Applications in a Cloud Environment Abstract? Using Ant Colony System to Consolidate Multiple Web Applications in a Cloud Environment. Infrastructure as a Service < Final Year Projects 2016 > IaaS clouds provide virtual machines(VMs) under a pay-per-use business model, which can be used to create a dynamically…

  • Using Crowdsourcing to Provide QoS for Mobile Cloud Computing

    Using Crowdsourcing to Provide QoS for Mobile Cloud Computing

    0 out of 5
    4,500

    Using Crowdsourcing to Provide QoS for Mobile Cloud Computing Abstract?Using Crowdsourcing to Provide QoS for Mobile Cloud Computing.Quality of cloud service QoS < Final Year Projects 2016 > is one of the crucial factors for the success of cloud providers in mobile cloud computing. Context-awareness is a popular method for automatic awareness of the mobile…

  • Using Data Mining Techniques  for Detecting  Terror-Related  Activities on the Web

    Using Data Mining Techniques for Detecting Terror-Related Activities on the Web

    0 out of 5
    4,500

    Using Data Mining Techniques for Detecting Terror-Related Activities on the Web Abstract? Using Data Mining Techniques for Detecting Terror-Related Activities on the Web. An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit information is presented. The proposed methodology learns the typical behavior (?profile?) of terrorists by applying a data…

  • Using Virtual Machine Allocation Policies to  Defend against Co-resident Attacks in Cloud  Computing

    Using Virtual Machine Allocation Policies to Defend against Co-resident Attacks in Cloud Computing

    0 out of 5
    4,500

    Using Virtual Machine Allocation Policies to Defend against Co-resident Attacks in Cloud Computing Abstract? Using Virtual Machine Allocation Policies to Defend against Co-resident Attacks in Cloud Computing. Cloud computing enables users to consume various < Final Year Projects 2016 > IT resources in an on-demand manner, and with low management overhead. However, customers can face…

  • Vampire attacks: Draining life from wireless ad-hoc sensor networks

    Vampire attacks: Draining life from wireless ad-hoc sensor networks

    0 out of 5
    4,500

    Vampire attacks: Draining life from wireless ad-hoc sensor networks Images Abstract? Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. < Final Year Project > Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores…

  • VANET-Based Secure and Privacy-Preserving Navigation

    VANET-Based Secure and Privacy-Preserving Navigation

    0 out of 5
    4,500

    VANET-Based Secure and Privacy-Preserving Navigation   Abstract? VANET-Based Secure and Privacy-Preserving Navigation. In this paper, we propose a navigation scheme that utilizes the online road information collected by a vehicular ad hoc network (VANET) to guide the drivers to desired destinations in a real-time and distributed manner. The proposed scheme has the advantage of using…

  • Vehicular Cloud Data Collection for Intelligent Transportation Systems

    Vehicular Cloud Data Collection for Intelligent Transportation Systems

    0 out of 5
    4,500

    Vehicular Cloud Data Collection for Intelligent Transportation Systems Abstract-The Internet of Things (IoT) envisions to connect billions of sensors to the Internet, in order to provide new applications and services for smart cities. IoT will allow the evolution of the Internet of Vehicles (IoV) from existing Vehicular Ad hoc Networks (VANETs), in which the delivery…

  • Ver ifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing

    Ver ifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing

    0 out of 5
    4,500

    Verifiable and Exculpable Outsourced Attribute-Based Encr yption for Access Control in Cloud Computing Abstract-In the first place, propose two ciphertext-policy attribute-based key encapsulation mechanism (CP-AB-KEM) schemes that for the first time achieve both outsourced encryption and outsourced decryption in two system storage models and give corresponding security analysis. In our schemes, heavy computations are outsourced…

  • Verifiable Auditing for Outsourced Database in Cloud Computing

    Verifiable Auditing for Outsourced Database in Cloud Computing

    0 out of 5
    4,500

    Verifiable Auditing for Outsourced Database in Cloud Computing Abstract? Verifiable Auditing for Outsourced Database in Cloud Computing. The notion of database outsourcing enables the data owner to delegate the database management to a cloud service provider < Final Year Projects 2016 > CSP that provides various database services to different users. Recently, plenty of research…

End of content

End of content