Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service Abstract?Collection and analysis of various logs (e.g., process logs, network logs) are fundamental activities in computer forensics. Ensuring the security of the activity logs is therefore crucial to ensure reliable forensics investigations. However, because of the black-box nature of clouds and the volatility and co-mingling of cloud…
Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service Abstract?Towards Building Forensics Enabled Cloud Through Secure Logging-as-a-Service. Collection and analysis of various logs < Final Year Projects 2016 > e.g., process logs, network logs are fundamental activities in computer forensics. Ensuring the security of the activity logs is therefore crucial to ensure reliable forensics investigations. However,…
Towards Privacy-preserving and Practical Image-centric Social Discovery Abstract? Images are becoming one of the key enablers of user connectivity in social media applications. Many of them are directly exploring image content to suggest new friends with similar interests. < final year projects > [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete…
Trustworthy Parking Communities: Helping Your Neighbor to Find a Space Abstract?Cooperation between vehicles facilitates traffic management, road safety and infotainment applications. Cooperation, however, requires trust in the validity of the received information. In this paper, we tackle the challenge of securely exchanging parking spot availability information. Trust is crucial in order to support the decision…
Universal Network Coding-Based Opportunistic Routing for Unicast Abstract?Universal Network Coding-Based Opportunistic Routing for Unicast. Network coding-based opportunistic routing has emerged as an elegant way to optimize the capacity of lossy wireless multihop networks by reducing the amount of required feedback messages. Most of the works on network coding-based opportunistic routing in the literature assume that…
Using Facebook for Image Steganography Abstract? Facebook is available on hundreds of millions of desktop and mobile computing platforms around the world and because it is available on many different kinds of platforms (from desktops and laptops running Windows, Unix, or OS X to hand held devices running iOS, Android, or Windows Phone), it would…