{"title":"Detecting Distributed Denial-of-Service DDoS Attacks","authors":"Fasidi Fo, Adebayo Ot","doi":"10.32474/CTCSA.2019.01.000110","DOIUrl":"https://doi.org/10.32474/CTCSA.2019.01.000110","url":null,"abstract":"Security of information is of utmost importance to organization\u0000striving to survive in a competitive marketplace. Network security\u0000has been an issue since computer networks became prevalent,\u0000most especially now that internet is changing the face of computing.","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123465486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigating Disaster using Secure Threshold-Cloud Architecture","authors":"Elochukwu A. Ukwandu, W. Buchanan, Gordon Russell","doi":"10.32474/ctcsa.2018.01.000107","DOIUrl":"https://doi.org/10.32474/ctcsa.2018.01.000107","url":null,"abstract":"With the introduction of cloud services for disaster management on a scalable rate, there appears to be the needed succour by small business owners to get a cheaper and more secure disaster recovery mechanism to provide business continuity and remain competitive with other large businesses. But that is not to be so, as cloud outages became a nightmare. Recent statistics by Ponemon Institute [1] on Cost of Data Centre Outages, shows an increasing rate of 38% from $505,502 in 2010 to $740,357 as at January 2016. Using activity-based costing they were able to capture direct and indirect cost to: Damage to mission-critical data; Impact of downtime on organizational productivity; Damages to equipment and other assets and so on. The statistics were derived from 63 data centres based in the United States of America. These events may have encouraged the adoption of multi-cloud services so as to divert customers traffic in the event of cloud outage. Some finegrained proposed solutions on these are focused on Redundancy and Backup such as: Local Backup by [2]; Geographical Redundancy and Backup [3]; The use of Inter-Private Cloud Storage [4]; Resource Management for data recovery in storage clouds [5], and so on. But in all these, cloud service providers see disaster recovery as a way of getting the system back online and making data available after a service disruption, and not on contending disaster by providing robustness that is capable of mitigating shocks and losses resulting from these disasters.","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130525324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Image Secret Sharing Method Based on Shamir Secret Sharing","authors":"Selda Çalkavur, Fatih Molla","doi":"10.32474/ctcsa.2018.01.000106","DOIUrl":"https://doi.org/10.32474/ctcsa.2018.01.000106","url":null,"abstract":"The effective and secure protection for important message is a primary concern in commercial and military applications. Numerous techniques, such as image hiding and watermarking, were developed to increase the security of the secret. The secret image sharing approaches are useful for protecting sensitive information [1]. The main idea of secret sharing is to transform an image into n shadow images that are transmitted and stored separately. The original image can be reconstructed only if the shadow images that participated in the revealing process from a qualified set [2]. The (k; n)-threshold image sharing schemes were developed to avoid the single point failure. Hence the encoded content is corrupted during transmission. In these schemes, the original image can be revealed if k or more of these n shadow images are obtained. Moreover, the users who with complete knowledge of k 1 shares cannot obtain the original image. Blakley [3] & Shamir [4] independently proposed original concepts of secret sharing in 1979. In these (k; n)-threshold schemes encode the input data D into n shares, which are then distributed among k recipients. D can be reconstructed by anyone who obtains a predefined number k, where 1 k n, of the images.","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124377224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Numerical Solution of Boundary Layer Flow of Viscous Fluid Via Successive Linearization Method","authors":"F. Salah, Abdelmgid Om Sidahmed","doi":"10.32474/ctcsa.2018.01.000108","DOIUrl":"https://doi.org/10.32474/ctcsa.2018.01.000108","url":null,"abstract":"In the recent years, a great deal of interest has been gained to fluids applications. Some fluids not easy to expressed by particular constitutive relationship between shear rates and stress and which is totally different than the viscous fluids [1,2]. These fluids including many home items namely, toiletries, paints, cosmetics certain oils, shampoo, jams, soups etc. have different features and are denoted by non-Newtonian fluids. In general, the categorization of non-Newtonian fluid models is given under three class which are named the integral, differential, and rate types [3-6]. In the present study, the main interest is to discuss the heat transfer flow of hydrodynamic viscous fluid over a flat plate in a uniform stream of fluid with dissipation effect. The most phenomena in the field of engineering and science that occur is nonlinear. With this nonlinearity the equations become more difficult to handle and solve. Some of these nonlinear equations can be solved by using approximate analytical methods such as Homotopy analysis method (HAM) proposed by liao S [7,8], Homotopy Perturbation method (HPM) it was found by Ji-Huan [9] and Adomain decomposition method (ADM) Q Esmaili et al. [10], Makinde OD et al. [11] and Makinde OD [12].","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116860774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"In Pursuit of Privacy: An Introduction to Anonymization Technologies","authors":"G. Wolf","doi":"10.32474/CTCSA.2018.01.000103","DOIUrl":"https://doi.org/10.32474/CTCSA.2018.01.000103","url":null,"abstract":"Privacy in the age of pervasive computing and networking is a very hard topic to fully grasp. Any serious attempt at discussing it must take many different angles into account. User interactions grow richer month after month, and due to Big Data techniques, more information about each individual is known to third parties than to the person in question themselves; this is illustrated in the concept of inverse privacy [4]. What is a user to do to keep at least a basic expectation of privacy? Due to the pervasive analysis, a user can only expect their actions to remain private by becoming anonymous-By incorporating into their everyday activities Privacy Enhancement Technologies (PETs) that avoid each of their actions to be linked into a wide-encompassing profile. Anonymity is often achieved via confusion and blending in the crowd: If a person wants their messages to be concealed, they usually first need to identify and use an active network carrying traffic in which to hide; implementations starting with Chaum’s mix networks [2] expressly assume an existing level of traffic needed for anonymous messages to be hidden. Mix networks are based on public key cryptography, first delineated in 1976 [3]. In a nutshell, each message is encrypted with the public key of several intermediaries, forming a route that must be followed in order to reach its destination. That is, having users A, B, C, D and E, each of whom has an asymmetric key pair {KA, KA}, {KB, KB} etc. and denoting encryption and decryption of a clear-text message M to a secret-containing cyphertext S respectively as S=Enc(M; KA) (which anybody can do, as the public key KA is known by every actor) and M=Dec(S; KA) (which only A can perform, as only this actor has knowledge of KA).","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"35 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123491331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of Things and Privacy","authors":"Christos P. Beretas","doi":"10.15406/EETOAJ.2018.02.00024","DOIUrl":"https://doi.org/10.15406/EETOAJ.2018.02.00024","url":null,"abstract":"","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114556770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}