International Journal of Interdisciplinary Telecommunications and Networking最新文献

筛选
英文 中文
A Novel Zone-Walking Protection for Secure DNS Server 一种新的安全DNS服务器区域行走保护
IF 0.8
Arnob Paul, H. Islam, Shohrab Hossain, Husnu S. Narman
{"title":"A Novel Zone-Walking Protection for Secure DNS Server","authors":"Arnob Paul, H. Islam, Shohrab Hossain, Husnu S. Narman","doi":"10.4018/ijitn.312235","DOIUrl":"https://doi.org/10.4018/ijitn.312235","url":null,"abstract":"A zone walking attack is to get all existing domain information from a secured DNS server. NSEC3 protocol was proposed to defend against zone walking attacks in a secured DNS server, although NSEC3 uses more CPU time. In this paper, the authors have proposed two novel solutions to defend against the zone walking attack by addressing the efficiency issue of secure DNS protocol. They have simulated the proposed solution and analyzed it with different scenarios of the secure DNS server and attackers. The result of the experiment shows that the proposed solution Low Profiling can be effective against zone walking attacks for up to certain server-side and client-side parameters. The work can help researchers to understand how a new approach in the DNSSEC server can defend against zone walking attacks.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46127088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of Machine-Learning Models for Self-Healing in 5G Networks 5G网络中自愈机器学习模型的性能评估
IF 0.8
Tamer R. Omar, A. Amamra, T. Ketseoglou, Cristian Mejia, Cesar Soto, Quinlan Stankus, Grant Zelinka
{"title":"Performance Evaluation of Machine-Learning Models for Self-Healing in 5G Networks","authors":"Tamer R. Omar, A. Amamra, T. Ketseoglou, Cristian Mejia, Cesar Soto, Quinlan Stankus, Grant Zelinka","doi":"10.4018/ijitn.309701","DOIUrl":"https://doi.org/10.4018/ijitn.309701","url":null,"abstract":"The 5G self-organizing network is a viable solution to the problem of increasing user-connectivity, data rates, and network complexity. This paper proposes a SON solution that uses machine learning for anomaly detection in order to meet user demands. Three different supervised ML algorithms are used for anomaly detection to see which provides the most efficient and accurate results. The various algorithms used key performance indicators (KPIs) to determine whether a base station is healthy, congested, or failing. In order to achieve unbiased results, large datasets composed of multiple simulated network scenarios were preprocessed and partitioned for training and testing. The results show that state vector machine algorithm can accurately detect the status of a base station at exponentially lower processing times than the other ML algorithms. This algorithm was most efficient when larger datasets were used to create the model.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70459921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review of COVID-19 Mobile Contact Tracing Applications and Their Impact on Privacy COVID-19手机接触者追踪应用及其对隐私的影响
IF 0.8
Joanne C. Peca, Galen A. Grimes, M. Nasereddin, Edward J. Glantz
{"title":"A Review of COVID-19 Mobile Contact Tracing Applications and Their Impact on Privacy","authors":"Joanne C. Peca, Galen A. Grimes, M. Nasereddin, Edward J. Glantz","doi":"10.4018/ijitn.309696","DOIUrl":"https://doi.org/10.4018/ijitn.309696","url":null,"abstract":"Contact tracing is a well-established process that has been utilized for years to assist in the effort to control the spread of contagious diseases. The rapid onset and spread of COVID-19 brought about the need for digital solutions which would help to speed up the collection and analysis of relevant health information. With the proliferation of mobile devices, the development of mobile device-based digital contact tracing applications appeared to be the solution. As countries around the globe created digital contact tracing applications for use by their respective populations, a variety of factors allowed for success for some and resulted in failure for others. This review highlights example countries with respect to their unique COVID-19 digital contact tracing solutions, the success or failure of the applications employed on mobile platforms, and the factors which have contributed to the success or failure of these solutions. Additionally, a review of research around data privacy and security in digital contact tracing apps is included.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41421788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection and Analysis Ads Through the Mini-Programs 通过小程序检测和分析广告
IF 0.8
Biao Liu, Lin jie Liu, Jianyi Zhang
{"title":"Detection and Analysis Ads Through the Mini-Programs","authors":"Biao Liu, Lin jie Liu, Jianyi Zhang","doi":"10.4018/ijitn.309700","DOIUrl":"https://doi.org/10.4018/ijitn.309700","url":null,"abstract":"Due to the widespread application and rapid delivery of advertisements for mini-programs, mini-program users are increasingly being harassed by advertisements. However, due to the existence of mini-programs dependent on the corresponding platforms, traditional advertising detection methods cannot detect the advertisements of the mini-programs. In the process of collecting and studying advertising problems, the authors have developed a framework that can run continuously almost without human intervention. They have analyzed 4853 mini-programs in total and got a general understanding of the problems of mini-programs' advertisements. There are several interesting findings, such as frequent pop-up advertisements, redirection, pornographic advertisements, etc. The authors have further detected pornographic advertisements and analyzed the links obtained in mini-programs to identify the malicious nature of the links. Broadly speaking, the framework collects the advertising problems of mini-programs and detects and analyzes some advertisements and malicious links to strengthen the supervision of the platform.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48188843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G Mid-Range Electromagnetic Spectrum Implementation for Critical Infrastructure Development 用于关键基础设施开发的5G中程电磁频谱实施
IF 0.8
U. O. Matthew, J. S. Kazaure, Prisca I. Okochi
{"title":"5G Mid-Range Electromagnetic Spectrum Implementation for Critical Infrastructure Development","authors":"U. O. Matthew, J. S. Kazaure, Prisca I. Okochi","doi":"10.4018/ijitn.307103","DOIUrl":"https://doi.org/10.4018/ijitn.307103","url":null,"abstract":"The current research analysed the existing literature on the electromagnetic spectrum influences and made significant contributions in the perspective of the ongoing insinuations of electromagnetic frequency radiation emitted from the novel 5G network technology installations. In this case, the contemporary 5G network technology was tested along ANALOGY1, ANALOGY 2 and ANALOGY3 to find out if 5G network does emit electromagnetic non-ionizing radiation capable of destroying human body cells as already alleged. The paper observed that deploying the standalone 5G network on unmodulated ultra-high frequency beyond 20Gigahertz will produce non-ionizable, non-visible radiation (electrons and protons interacting as fields) capable of adverse health effect including heating up the human skin through polarisation and dipolar moment urtication , thereby destabilising the equilibrium of the human DNA charged particles through the formation of free radicals that are highly reactive due to the presence of unpaired electrons that occurred when water molecules are broken within the human cell.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49086803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Coronavirus Pandemic (COVID-19) and Cooperative-Intelligent Transport Systems 冠状病毒大流行(COVID-19)与协同智能交通系统
IF 0.8
Bettina Arnegger
{"title":"The Coronavirus Pandemic (COVID-19) and Cooperative-Intelligent Transport Systems","authors":"Bettina Arnegger","doi":"10.4018/ijitn.311827","DOIUrl":"https://doi.org/10.4018/ijitn.311827","url":null,"abstract":"Cooperative-intelligent transport systems (C-ITS) are a solution for the manifold challenges of traffic as well as a major competitive stepping stone for the European automotive and tele-communication industry. However, against the backdrop of far-reaching COVID-19 impacts, the management of such complex C-ITS megaprojects needs to be adapted. Insights from most recent research contributions on megaproject management and the unexpected have shown that fostering a common sense of action, intense and efficient communication, and a strong organizational culture can help C-ITS projects to cope with the unprecedented situation. The institutional role model has proven to be an effective implementation framework for employing such project management methods in the C-ITS context. By combining different strands of research in an analysis of the intersection between recent C-ITS findings and theory on megaproject management and the unexpected, this article contributes to a holistic understanding of the impact of COVID-19 on C-ITS.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44902514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Advanced Encryption Standard by New Substitution Box in Galois Field (𝟐𝟖) 基于伽罗瓦领域新型替换盒的高级加密标准设计与实现(𝟖)
IF 0.8
International Journal of Interdisciplinary Telecommunications and Networking Pub Date : 2022-01-01 DOI: 10.21608/ijt.2022.266474
Wageda Alsobky, Abdelkader Ismail, A. Mohra, Ayman M. Hassan, Ayman Abdelaziem
{"title":"Design and Implementation of Advanced Encryption Standard by New Substitution Box in Galois Field (𝟐𝟖)","authors":"Wageda Alsobky, Abdelkader Ismail, A. Mohra, Ayman M. Hassan, Ayman Abdelaziem","doi":"10.21608/ijt.2022.266474","DOIUrl":"https://doi.org/10.21608/ijt.2022.266474","url":null,"abstract":": An inverse multiplexing method for irreducible polynomials is presented in this paper based on the theory of substitution boxes. The method is based on the theory of substitution boxes. Following a series of successful experiments, the new approach was put into practice. For reasons of increased complexity and security, the affine conversion period in the Galois field (2^8) has been increased to the maximum value of the period between input and output of 102, the Strict Avalanche Criterion (SAC) has been reduced to nearly half of its original value, and the results are bijective as a result. It was decided to use the number 112 after the Bit Independent Criterion effect had been reduced to produce good results. These breakthroughs are being used to protect information security and to strengthen the advanced encryption standard that is currently in use, according to the researchers. In addition to the addition of a new s-box, their encryption will be more secure and private, making our services even more valuable. Field, Bijective, Balance, SAC.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73749852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Social Network Anomaly Detection for Optimized Decision Development 用于优化决策开发的社交网络异常检测
IF 0.8
Harshit Srivastava, E. Sheybani, R. Sankar
{"title":"Social Network Anomaly Detection for Optimized Decision Development","authors":"Harshit Srivastava, E. Sheybani, R. Sankar","doi":"10.4018/ijitn.309697","DOIUrl":"https://doi.org/10.4018/ijitn.309697","url":null,"abstract":"The paper presents the development of systems for improved source selection in a process that creates real-time categorization of events using only posts collected through various sensing applications that use social networks (such as Twitter or other mass dissemination networks) for reporting. The system recognizes critical instances in applications and simply views essential information from users (either by explicit user action or by default, as on Twitter) within the event and provides a textual description. As a result, social networks open up unprecedented possibilities for creating sensing applications by representing a set of tweets generated in a limited timeframe as a weighted network for influence concerning users. Obtaining data from a network of social site users substantiates the quality and dependability of data. It collects many users' dynamic behavior to construct and disseminate related information across the channel. The goal is to find a link between various data sources for event abnormalities.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48080012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Frequency Domain Transformations and CNNs to Predict Unlabeled Shark Behavior With GPS Data 频域变换和cnn用GPS数据预测未标记的鲨鱼行为
IF 0.8
Geoffrey Daniel Farthing, Hen-Guel Yeh
{"title":"Frequency Domain Transformations and CNNs to Predict Unlabeled Shark Behavior With GPS Data","authors":"Geoffrey Daniel Farthing, Hen-Guel Yeh","doi":"10.4018/ijitn.309698","DOIUrl":"https://doi.org/10.4018/ijitn.309698","url":null,"abstract":"This paper provides a comprehensive analysis of frequency domain transformations applied to convolutional neural networks (CNN) to model and predict unlabeled shark behavior in the open ocean with GPS position data. The frequency domain-based CNN networks are compared against the time domain CNN to contrast the two CNN architectures. The shark behavior data were obtained through two datasets where tri-axis accelerometer data were collected from live sharks. The first dataset was from the CSULB Shark Lab and consisted of labeled shark behavior into four shark behavioral categories. The second dataset used in this study was unlabeled and recorded from sharks in the open ocean and had GPS positioning data and depth data points. Findings show that the CNN architecture based on the frequency domain slightly outperforms time-based CNNs for classifying California horn shark behavior. Through spectral density analysis, prominent features are extracted and allow for distinguishing the shark behaviors.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44761106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Autonomous Flight of High-Endurance UAVs to Monitor Powerlines 高续航时间无人机自主飞行监测电力线
IF 0.8
Derek M. Mata, Raffael Pillai, Ryan Sandoval, Shaker Ahmed, Do gyu Lee, Martin O'Connell, Joshua J. Kidwell, S. Dobbs, Zhen Yu
{"title":"Autonomous Flight of High-Endurance UAVs to Monitor Powerlines","authors":"Derek M. Mata, Raffael Pillai, Ryan Sandoval, Shaker Ahmed, Do gyu Lee, Martin O'Connell, Joshua J. Kidwell, S. Dobbs, Zhen Yu","doi":"10.4018/ijitn.309699","DOIUrl":"https://doi.org/10.4018/ijitn.309699","url":null,"abstract":"In this project, the authors will develop a highly efficient UAV (unmanned aerial vehicle) architecture for long endurance flights. The authors propose an IoT (internet of things) model that will connect a network of drones using a 4G LTE (long-term evolution) connection. The researchers also propose the use of MEC (mobile edge computing) stations, smart GCSs (ground control stations) for battery replacement, and wireless charging via powerline magnetic field harvesting. The authors will be applying these ideas to a powerline monitoring mission profile, creating a large sensor network with computer vision capabilities to detect powerline faults and report them to the proper authorities.","PeriodicalId":42285,"journal":{"name":"International Journal of Interdisciplinary Telecommunications and Networking","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45570971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信