Current Trends in Computer Sciences & Applications最新文献

筛选
英文 中文
Detecting Distributed Denial-of-Service DDoS Attacks 检测分布式拒绝服务DDoS攻击
Current Trends in Computer Sciences & Applications Pub Date : 2019-02-04 DOI: 10.32474/CTCSA.2019.01.000110
Fasidi Fo, Adebayo Ot
{"title":"Detecting Distributed Denial-of-Service DDoS Attacks","authors":"Fasidi Fo, Adebayo Ot","doi":"10.32474/CTCSA.2019.01.000110","DOIUrl":"https://doi.org/10.32474/CTCSA.2019.01.000110","url":null,"abstract":"Security of information is of utmost importance to organization\u0000striving to survive in a competitive marketplace. Network security\u0000has been an issue since computer networks became prevalent,\u0000most especially now that internet is changing the face of computing.","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123465486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigating Disaster using Secure Threshold-Cloud Architecture 使用安全阈值-云架构减轻灾难
Current Trends in Computer Sciences & Applications Pub Date : 2018-11-26 DOI: 10.32474/ctcsa.2018.01.000107
Elochukwu A. Ukwandu, W. Buchanan, Gordon Russell
{"title":"Mitigating Disaster using Secure Threshold-Cloud Architecture","authors":"Elochukwu A. Ukwandu, W. Buchanan, Gordon Russell","doi":"10.32474/ctcsa.2018.01.000107","DOIUrl":"https://doi.org/10.32474/ctcsa.2018.01.000107","url":null,"abstract":"With the introduction of cloud services for disaster management on a scalable rate, there appears to be the needed succour by small business owners to get a cheaper and more secure disaster recovery mechanism to provide business continuity and remain competitive with other large businesses. But that is not to be so, as cloud outages became a nightmare. Recent statistics by Ponemon Institute [1] on Cost of Data Centre Outages, shows an increasing rate of 38% from $505,502 in 2010 to $740,357 as at January 2016. Using activity-based costing they were able to capture direct and indirect cost to: Damage to mission-critical data; Impact of downtime on organizational productivity; Damages to equipment and other assets and so on. The statistics were derived from 63 data centres based in the United States of America. These events may have encouraged the adoption of multi-cloud services so as to divert customers traffic in the event of cloud outage. Some finegrained proposed solutions on these are focused on Redundancy and Backup such as: Local Backup by [2]; Geographical Redundancy and Backup [3]; The use of Inter-Private Cloud Storage [4]; Resource Management for data recovery in storage clouds [5], and so on. But in all these, cloud service providers see disaster recovery as a way of getting the system back online and making data available after a service disruption, and not on contending disaster by providing robustness that is capable of mitigating shocks and losses resulting from these disasters.","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130525324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Image Secret Sharing Method Based on Shamir Secret Sharing 基于Shamir秘密共享的图像秘密共享方法
Current Trends in Computer Sciences & Applications Pub Date : 2018-11-20 DOI: 10.32474/ctcsa.2018.01.000106
Selda Çalkavur, Fatih Molla
{"title":"An Image Secret Sharing Method Based on Shamir Secret Sharing","authors":"Selda Çalkavur, Fatih Molla","doi":"10.32474/ctcsa.2018.01.000106","DOIUrl":"https://doi.org/10.32474/ctcsa.2018.01.000106","url":null,"abstract":"The effective and secure protection for important message is a primary concern in commercial and military applications. Numerous techniques, such as image hiding and watermarking, were developed to increase the security of the secret. The secret image sharing approaches are useful for protecting sensitive information [1]. The main idea of secret sharing is to transform an image into n shadow images that are transmitted and stored separately. The original image can be reconstructed only if the shadow images that participated in the revealing process from a qualified set [2]. The (k; n)-threshold image sharing schemes were developed to avoid the single point failure. Hence the encoded content is corrupted during transmission. In these schemes, the original image can be revealed if k or more of these n shadow images are obtained. Moreover, the users who with complete knowledge of k 1 shares cannot obtain the original image. Blakley [3] & Shamir [4] independently proposed original concepts of secret sharing in 1979. In these (k; n)-threshold schemes encode the input data D into n shares, which are then distributed among k recipients. D can be reconstructed by anyone who obtains a predefined number k, where 1 k n, of the images.","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124377224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mini View on Current Trends in Computer Sciences & Applications 计算机科学与应用的当前趋势
Current Trends in Computer Sciences & Applications Pub Date : 2018-11-09 DOI: 10.32474/CTCSA.2018.01.000104
A. Rana, Manjeet Singh
{"title":"Mini View on Current Trends in Computer Sciences & Applications","authors":"A. Rana, Manjeet Singh","doi":"10.32474/CTCSA.2018.01.000104","DOIUrl":"https://doi.org/10.32474/CTCSA.2018.01.000104","url":null,"abstract":"","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123505933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Numerical Solution of Boundary Layer Flow of Viscous Fluid Via Successive Linearization Method 粘性流体边界层流动的逐次线性化数值解
Current Trends in Computer Sciences & Applications Pub Date : 2018-11-04 DOI: 10.32474/ctcsa.2018.01.000108
F. Salah, Abdelmgid Om Sidahmed
{"title":"Numerical Solution of Boundary Layer Flow of Viscous Fluid Via Successive Linearization Method","authors":"F. Salah, Abdelmgid Om Sidahmed","doi":"10.32474/ctcsa.2018.01.000108","DOIUrl":"https://doi.org/10.32474/ctcsa.2018.01.000108","url":null,"abstract":"In the recent years, a great deal of interest has been gained to fluids applications. Some fluids not easy to expressed by particular constitutive relationship between shear rates and stress and which is totally different than the viscous fluids [1,2]. These fluids including many home items namely, toiletries, paints, cosmetics certain oils, shampoo, jams, soups etc. have different features and are denoted by non-Newtonian fluids. In general, the categorization of non-Newtonian fluid models is given under three class which are named the integral, differential, and rate types [3-6]. In the present study, the main interest is to discuss the heat transfer flow of hydrodynamic viscous fluid over a flat plate in a uniform stream of fluid with dissipation effect. The most phenomena in the field of engineering and science that occur is nonlinear. With this nonlinearity the equations become more difficult to handle and solve. Some of these nonlinear equations can be solved by using approximate analytical methods such as Homotopy analysis method (HAM) proposed by liao S [7,8], Homotopy Perturbation method (HPM) it was found by Ji-Huan [9] and Adomain decomposition method (ADM) Q Esmaili et al. [10], Makinde OD et al. [11] and Makinde OD [12].","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116860774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
In Pursuit of Privacy: An Introduction to Anonymization Technologies 追求隐私:匿名化技术简介
Current Trends in Computer Sciences & Applications Pub Date : 2018-10-09 DOI: 10.32474/CTCSA.2018.01.000103
G. Wolf
{"title":"In Pursuit of Privacy: An Introduction to Anonymization Technologies","authors":"G. Wolf","doi":"10.32474/CTCSA.2018.01.000103","DOIUrl":"https://doi.org/10.32474/CTCSA.2018.01.000103","url":null,"abstract":"Privacy in the age of pervasive computing and networking is a very hard topic to fully grasp. Any serious attempt at discussing it must take many different angles into account. User interactions grow richer month after month, and due to Big Data techniques, more information about each individual is known to third parties than to the person in question themselves; this is illustrated in the concept of inverse privacy [4]. What is a user to do to keep at least a basic expectation of privacy? Due to the pervasive analysis, a user can only expect their actions to remain private by becoming anonymous-By incorporating into their everyday activities Privacy Enhancement Technologies (PETs) that avoid each of their actions to be linked into a wide-encompassing profile. Anonymity is often achieved via confusion and blending in the crowd: If a person wants their messages to be concealed, they usually first need to identify and use an active network carrying traffic in which to hide; implementations starting with Chaum’s mix networks [2] expressly assume an existing level of traffic needed for anonymous messages to be hidden. Mix networks are based on public key cryptography, first delineated in 1976 [3]. In a nutshell, each message is encrypted with the public key of several intermediaries, forming a route that must be followed in order to reach its destination. That is, having users A, B, C, D and E, each of whom has an asymmetric key pair {KA, KA}, {KB, KB} etc. and denoting encryption and decryption of a clear-text message M to a secret-containing cyphertext S respectively as S=Enc(M; KA) (which anybody can do, as the public key KA is known by every actor) and M=Dec(S; KA) (which only A can perform, as only this actor has knowledge of KA).","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"35 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123491331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of Things and Privacy 物联网与隐私
Current Trends in Computer Sciences & Applications Pub Date : 2018-08-22 DOI: 10.15406/EETOAJ.2018.02.00024
Christos P. Beretas
{"title":"Internet of Things and Privacy","authors":"Christos P. Beretas","doi":"10.15406/EETOAJ.2018.02.00024","DOIUrl":"https://doi.org/10.15406/EETOAJ.2018.02.00024","url":null,"abstract":"","PeriodicalId":303860,"journal":{"name":"Current Trends in Computer Sciences & Applications","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114556770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信