2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)最新文献

筛选
英文 中文
Study of different cryptographic technique and challenges in future 不同密码技术的研究和未来的挑战
A. Bhardwaj, S. Som
{"title":"Study of different cryptographic technique and challenges in future","authors":"A. Bhardwaj, S. Som","doi":"10.1109/ICICCS.2016.7542353","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542353","url":null,"abstract":"In the recent years the need of security has increased many folds. It's not that the need to secure data is new and goes back to the time of 1st and 2nd world war and even back to the time of Caesar. This paper gives a history of all the data hiding techniques used in the history and how these techniques have evolved from Caesar cipher to DES and then to Triple-DES, AES and current algorithms. This paper will explain the pros and cons of previous algorithms and why they are not used now a day. The scope of this paper will go from general data hiding techniques and then moves to cryptographic algorithms.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129462775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Internet of Things: Security challenges for next generation networks 物联网:下一代网络的安全挑战
Krishnakant Gupta, Sapna Shukla
{"title":"Internet of Things: Security challenges for next generation networks","authors":"Krishnakant Gupta, Sapna Shukla","doi":"10.1109/ICICCS.2016.7542301","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542301","url":null,"abstract":"Internet of Things(IoT) is the next big boom in the networking field. The vision of IoT is to connect daily used objects (which have the ability of sensing and actuation) to the Internet. This may or may or may not involve human. IoT field is still maturing and has many open issues. We build up on the security issues. As the devices have low computational power and low memory the existing security mechanisms (which are a necessity) should also be optimized accordingly or a clean slate approach needs to be followed. This is a survey paper to focus on the security aspects of IoT. We further also discuss the open challenges in this field.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129954493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
IoT based Smart Home design using power and security management 基于物联网的智能家居设计,采用电源和安全管理
Punit Gupta, Jasmeet Chhabra
{"title":"IoT based Smart Home design using power and security management","authors":"Punit Gupta, Jasmeet Chhabra","doi":"10.1109/ICICCS.2016.7542317","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542317","url":null,"abstract":"The paper presents the design and implementation of an Ethernet-based Smart Home intelligent system for monitoring the electrical energy consumption based upon the real time tracking of the devices at home an INTEL GALILEO 2ND generation development board, which can be used in homes and societies. The proposed system works on real time monitoring and voice control, so that the electrical devices and switches can be remotely controlled and monitored with or without an android based app. It uses various sensors to not only monitor the real time device tracking but also maintaining the security of your house. It is monitored and controlled remotely from an android app using the Internet or the Intranet connectivity. The proposed outcome of the project aims as multiple benefits of saving on electricity bills of the home as well as keep the users updated about their home security with an option of controlling the switching of the devices by using their voice or simple toggle touch on their smartphone, and last but most importantly, monitor the usage in order to conserve the precious natural resources by reducing electrical energy consumption.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130214527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 83
Overview of PaaS and SaaS and its application in cloud computing PaaS和SaaS概述及其在云计算中的应用
Akanksha Singh, Smita Sharma, S. Kumar, S. Yadav
{"title":"Overview of PaaS and SaaS and its application in cloud computing","authors":"Akanksha Singh, Smita Sharma, S. Kumar, S. Yadav","doi":"10.1109/ICICCS.2016.7542322","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542322","url":null,"abstract":"In current time Cloud Computing is significant hi-tech research area in latest technology. These technologies give users several advantages: cost effectiveness, efficient resource utilisation, collaboration, disaster recovery and high performance. Cloud offers services for computing on single mouse click. Survey was carried out in form of an online questionnaire. This research also investigates Usability of the Service Models depending on occupational Status of individuals. Features used in differentiating SaaS and PaaS were: description, characteristics, security, advantages and disadvantages. The parameter used for comparison wasGoal, Customisation, Paradigm Shift, Programming Skills, Security level, Ownership, Resource, User Friendly, and Examples. The results obtained reveal that SaaS users are much more to PaaS, and the most used cloud computing storage is Google Apps. The most inhibitors of SaaS adoption all over the world is security and privacy issues, while PaaS is the platform development programming language. Therefore, cloud service providers (CSPs) should take note of these deficiencies.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130841935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Analyzing and assessing the security-related defects 分析和评估与安全相关的缺陷
A. Bansal, R. Malhotra, Kimaya Raje
{"title":"Analyzing and assessing the security-related defects","authors":"A. Bansal, R. Malhotra, Kimaya Raje","doi":"10.1109/ICICCS.2016.7542332","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542332","url":null,"abstract":"The use of the Internet has become an integral part of everyone's life. Due to this, the introduction of virus and other malicious crackers is increasing everyday. This in turn leads to the introduction of defects which adversely affect the security. Thus, protecting vital information in this cyber world is not an easy task. We need to deal with security related defects to ensure failure free and smooth functioning of the software. Thus, in this paper, we intend to study and analyze various aspects of security-related defects by analyzing the defect reports available in various open-source software repositories. Besides this, prediction models can also be constructed which can be used by researchers and practitioners to predict various aspects of security - related defects. Such prediction models are especially beneficial for large-scale systems, where testing experts need to focus their attention and resources to the problem areas of the system under development. Thus, application of software prediction models in the early phases of the software life cycle contributes to efficient defect removal and results in delivering more reliable and better quality software products. Empirical studies lack the use of proper research methodology and thus result in reporting inconsistent results. This study will review the sequence of steps followed in the research process for carrying empirical and replicated studies. The steps include (a) literature survey and definition of variables (b) data collection (c) report findings using statistical and machine learning techniques (d) analyzing performance measures for evaluating the performance of the predicted models and (e) interpretation of the obtained results for developing a software prediction model. These steps are explained with the help of experimental public domain data set. In addition, the paper provides an overview of repositories for mining software engineering data, tools for analyzing this data and various categories of machine learning methods. It also discusses existing research avenues and provides future research directions in this area.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117312427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative study of feature extraction techniques used in sentiment analysis 情感分析中特征提取技术的比较研究
Sneha Pasarate, R. Shedge
{"title":"Comparative study of feature extraction techniques used in sentiment analysis","authors":"Sneha Pasarate, R. Shedge","doi":"10.1109/ICICCS.2016.7542328","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542328","url":null,"abstract":"There is a need to analyze sentiments of people with the advancement of social media like social networks, blogs, and presentations. Sentiment analysis is a very challenging task as there is a huge amount of data present online. It is the analysis of sentiments on a particular entity in terms of positive, negative or neutral polarity. The challenge is the identification of the meaning of the word as it can be different in different situations. Feature extraction and identification is necessary to identify sentiment polarity. This paper shows comparative study of feature extraction techniques used in sentiment analysis.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129374699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Electronic load controllers for self excited induction generator 自激感应发电机的电子负载控制器
S. Singh, Murari Lal Azad, Atul Kumar
{"title":"Electronic load controllers for self excited induction generator","authors":"S. Singh, Murari Lal Azad, Atul Kumar","doi":"10.1109/ICICCS.2016.7542354","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542354","url":null,"abstract":"Micro hydro projects are gaining world wide attention due to the various advantages. Micro hydro power is a renewable, clean and environmental friendly, less gestation period. Very small (below 10KW) capacity plant is viable if it is economic. Isolated micro hydro plant can be controlled either by governor system or by using Electronic controllers to keep its frequency constant. It may use conventional alternator or Induction generators. These schemes depend on the capacity and requirement. So by using appropriate technology we can reduce the cost of micro hydro system. This paper describes the requirement and concepts of Electronic load controller (ELC) and Induction generator controller (IGC). This paper describes the resent technology which can make very small schemes viable. Various Electronic controllers are discussed for induction generators as well as alternators. its pros and cons is described and economically viable system is suggested for the system below 30 kw capacity.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127307883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Trust and deadline aware scheduling algorithm for cloud infrastructure using ant colony optimization 基于蚁群优化的云基础设施信任和期限感知调度算法
Punit Gupta, S. P. Ghrera
{"title":"Trust and deadline aware scheduling algorithm for cloud infrastructure using ant colony optimization","authors":"Punit Gupta, S. P. Ghrera","doi":"10.1109/ICICCS.2016.7542337","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542337","url":null,"abstract":"Cloud computing is now trending and more popular in these days for the computation and adopted by many companies like Google, Amazon, Microsoft etc., As the cloud size increases with increase in number of data center power consumption over a data center increases. As number of request over the data center increase with increase in load and power consumption of the data center. So the requests need to be balanced in such manner which having more effective strategy for utilization of resources and reduction in power consumption. Request balancing in such manner without having knowledge of load over server maximize resource utilization but also increasing power consumption at server. So to overcome these issues in cloud Infrastructure as a service (IaaS), we have proposing a trust based scheduling algorithm using ant colony to minimize the load, OoS of the system. Proposed algorithm has proven to have better performance in term of load and reduced request failure as compared to previously proposed scheduling balancing algorithm for cloud IaaS.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128730313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信