The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Criminal activity in the Internet is becoming more sophisticated. Traditional information security techniques hardly cope with recent trends. Honeypots proved to be a valuable source of threat intelligence. In this work several Honeypots are combined into a Honeynet and observed exploitation attempts. The Honeynet consists of six Honeypots and was operated for 222 days. 12 million exploitation attempts...
Nowadays, many requirements must be fulfilled in relation to the application of agrochemicals in different productive stages of the export fruit in Chile. Agronomists in charge of productive orchards should consult different sources of information before proceeding to apply a certain product. This is based on technical guides and protocols that are also modified from time to time, which implies a...
Emotions are directly related whit external or internal stimulation which a person is submitted, influencing these stimuli on their physical and mental health. These emotional changes produce variations in cardiovascular behavior and respiratory activity. This research proposes the characterization of cardiac system in healthy subject submitted to 3 different audiovisual stimuli, by means of the analysis...
Traditional vehicular routing protocols cannot accurately foresee future location of each vehicle for efficient packet forwarding. Recently, the data mining approach has been applied to analyze huge vehicle trajectory data. In this paper, we propose a novel trajectory-based routing (NTR) protocol to improve the packet replication efficiency of vehicles in the Vehicular Delay Tolerant Network (VDTN)...
In this paper, we present the TARZAN platform, an integrated platform for analysis of digital data from security incidents. The platform serves primarily as a middleware between data sources and data processing applications, however, it also provides several supporting services and a runtime environment for the applications. The supporting services, such as a data storage, a resource and application...
Nowadays there are a great number of applications based on expert systems implementing the expertise of a human academic evaluator. Many of them refer to the self-evaluation of students' academic performance. The actual research targets the evaluation of academic courses from blended learning point of view. In this work, we present the design and implementation of an Intelligent Agent based Expert...
Botnet is a malicious software that can perform malicious activities, such as (Distributed Denial of Services) DDoS, spamming, phishing, key logging, click fraud, steal personal information and important data, etc. Botnets can replicate themselves without user consent. Several systems of botnet detection have been done by using a machine learning method with feature selection approach. Currently,...
Context: Despite being defined during the first phase of the Systematic Literature Review (SLR) process, the protocol is usually refined when other phases are performed. Several researchers have reported their experiences in applying SLRs in Software Engineering (SE) however, there is still a lack of studies discussing the iterative nature of the protocol definition, especially how it should be perceived...
The concept of agile domain name system (DNS) refers to dynamic and rapidly changing mappings between domain names and their Internet protocol (IP) addresses. This empirical paper evaluates the bias from this kind of agility for DNS-based graph theoretical data mining applications. By building on two conventional metrics for observing malicious DNS agility, the agility bias is observed by comparing...
ID3 decision tree data mining is a popular and widely studied data analysis technique for a range of applications. In this paper, we focus on the privacy-preserving ID3 decision tree algorithm on horizontally partitioned datasets. In such a scenario, data owners wish to learn the decision tree result from a collective data set but disclose minimal information about their own sensitive data. In this...
Novel trusted hardware extensions such as Intel's SGX enable user-space applications to be protected against potentially malicious operating systems. Moreover, SGX supports strong attestation guarantees, whereby remote parties can be convinced of the trustworthy nature of the executing user-space application. These developments are particularly interesting in the context of large-scale privacy-preserving...
A remote memory paging system called a distributed large memory (DLM) has been developed, which uses remote-node memories in a cluster, as the main memory extension of a local node. The DLM is available for out-of-core processing, i.e., processing of large-size data that exceeds the main memory capacity in the local node. By using the DLM and memory servers, it is possible to run multi-thread programs...
This paper designs a high-speed network data acquisition system based on big data platform with good expansibility and high real-time, aiming at the need of enterprises or organizations to acquire high-speed network data efficiently in network intrusion detection. Taking into account the storage capacity and computing power requirements of high-speed network traffic capture and processing, the whole...
The emergence and development of the Internet resulted in the generation of huge amounts of data, which are often distributed among different sites. Many organizations and companies attempted to mine the data with cloud computing. However, given the rise of various privacy issues, sensitive data (e.g., medical records) need to be encrypted before outsourcing to the cloud. To process data mining, such...
Fuzzy extractor provides key generation from biometrics and other noisy data. The generated key is seamlessly usable for any cryptographic applications because its information entropy is sufficient for security. Biometric authentication offers natural and passwordless user authentication in various systems where fuzzy extractors can be used for biometric information security. Typically, a biometric...
The Semantic Web of Things (SWoT) merges the Internet of Things with knowledge representation and reasoning techniques borrowed from the Semantic Web, in order to improve resource management and discovery. This paper proposes a SWoT framework in Wireless Sensor Networks (WSNs) enabling cooperative discovery of sensors and actuators. A backward-compatible extension of the Constrained Application Protocol...
Network engineers and security experts are constantly confronted with new threats that have yet to be handled. Mitigation of zero day attacks requires the implementation of machine learning algorithms for the detection of abnormalities and malicious behavior on the network. These processes are often time consuming and can add significant resource cost in terms of network speed and compute power. The...
This paper presents P5, a programmable packet parser with packet-level parallel processing for FPGA-based switches. P5 overcomes both limitations. First, P5 has the programmability of dynamically updating parsing algorithms at run-time. Second, P5 exploits packet-level parallelism in the bottleneck of parsing pipeline to compensate FPGA’s low clock frequency, and reduces resource consumption through...
Already from the early days of testing, practitioners distinguish between unit tests and integration tests as a strategy to locate defects. Unfortunately, the mining software engineering community rarely distinguishes between these two strategies, mainly because it is not straightforward to separate them in the code repositories under study. In this paper we exploited the TravisTorrent dataset provided...
The Internet of Things, like many future wireless sensor networks, is expected to follow a software defined paradigm, where protocol parameters and behaviors will be dynamically tuned as a function of the signal statistics. New protocols will be then injected as a software when certain events occur. For instance, new data compressors could be (re)programmed on-the-fly as the monitored signal type...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.