ISC Int. J. Inf. Secur.最新文献

筛选
英文 中文
Virtualized Network Management Laboratory for Educational Purposes 教育用虚拟化网络管理实验室
ISC Int. J. Inf. Secur. Pub Date : 2019-08-01 DOI: 10.22042/isecure.2019.11.3.24
Oula L. Abdulsattar, E. Al-Hemiary
{"title":"Virtualized Network Management Laboratory for Educational Purposes","authors":"Oula L. Abdulsattar, E. Al-Hemiary","doi":"10.22042/isecure.2019.11.3.24","DOIUrl":"https://doi.org/10.22042/isecure.2019.11.3.24","url":null,"abstract":"In this paper, we implement a Virtualized Network Management Laboratory named (VNML) linked to college campus network for educational purposes. This laboratory is created using Virtualbox virtualizer and GNS3 on Linux UBUNTU single HP DL380 G7 server platform. A total of 35 virtual devices (Routers, Switches and Virtual Machines) are created and distributed over virtualized campus network with seven network management tools configured and run. The proposed laboratory is aimed to overcome the limitations of network hardware existence in any educational facility teach network management subject in their curriculum. The other advantages include ease of managing the laboratory and overrides physical location setup within the same geographical area.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127381198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance 提出ST-Slotted-CS-ALOHA协议以节省时间和避免碰撞
ISC Int. J. Inf. Secur. Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.9
E. Khatter, Dina M. Ibrahim
{"title":"Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance","authors":"E. Khatter, Dina M. Ibrahim","doi":"10.22042/ISECURE.2019.11.0.9","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.9","url":null,"abstract":"Time Saving and energy consumption has become a vital issue that attracts the attention of researchers in Underwater Wireless Sensor Networks (UWSNs) fields. According to that, there is a strong need to improve MAC protocols performance in UWSNs, particularly enhancing the effectiveness of ALOHA Protocol. In this paper, a time-saving Aloha protocol with slotted carrier sense proposed which we called, ST-Slotted-CS-ALOHA protocol. The results of thesimulation demonstrate that our proposed protocol can save time and decrease the average delay when it compared with the other protocols. Moreover, it decreased energy consumption and raised the ratio of throughput. However, the number of dropped nodes does not give better results compared to other protocols.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130924864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase 大型软件系统实施阶段项目管理过程的度量研究
ISC Int. J. Inf. Secur. Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.21
Wajdi Al Jedaibi, Sufian Khamis
{"title":"Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase","authors":"Wajdi Al Jedaibi, Sufian Khamis","doi":"10.22042/ISECURE.2019.11.0.21","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.21","url":null,"abstract":"Project management is an important factor to accomplish the decision to implement large-scale software systems (LSS) in a successful manner. The effective project management comes into play to plan, coordinate and control such a complex project. Project management factor has been argued as one of the important Critical Success Factor (CSF), which need to be measured and monitored carefully during the implementation of Enterprise Resource Planning(ERP) systems. The goal of this article is to develop âAœCSF-Live!âAI which is a method for measuring, monitoring, and controlling critical success factors of large-scale software systems. To achieve such goal, we apply CSF-Live for the project management CSF. The CSF-Live uses the Goal/Question/Metric paradigm (GQM) to yield a flexible framework containing several metrics that we used it to develop a formulation to enable the measurement of the project management CSF. The formulation that we developed for the project management CSF implies that the significance of having proper project management when conducting an ERP system implementation, since it is positively associated with the success of the ERP.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121863284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Critical Success Factors for Data Virtualization: A Literature Review 数据虚拟化的关键成功因素:文献综述
ISC Int. J. Inf. Secur. Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.17
Matthias Gottlieb, Marwin Shraideh, Isabel Fuhrmann, M. Böhm, H. Krcmar
{"title":"Critical Success Factors for Data Virtualization: A Literature Review","authors":"Matthias Gottlieb, Marwin Shraideh, Isabel Fuhrmann, M. Böhm, H. Krcmar","doi":"10.22042/ISECURE.2019.11.0.17","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.17","url":null,"abstract":"Data Virtualization (DV) has become an important method to store and handle data cost-efficiently. However, it is unclear what kind of data and when data should be virtualized or not. We applied a design science approach in the first stage to get a state of the art of DV regarding data integration and to present a concept matrix. We extend the knowledge base with a systematic literature review resulting in 15 critical success factors for DV. Practitioners can use these critical success factors to decide between DV and Extract, Transform, Load (ETL) as data integration approach.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115820239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Considering Uncertainty in Modeling Historical Knowledge 考虑历史知识建模中的不确定性
ISC Int. J. Inf. Secur. Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.8
F. Zendaoui, Walid-Khaled Hidouci
{"title":"Considering Uncertainty in Modeling Historical Knowledge","authors":"F. Zendaoui, Walid-Khaled Hidouci","doi":"10.22042/ISECURE.2019.11.0.8","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.8","url":null,"abstract":"Simplifying and structuring qualitatively complex knowledge, quantifying it in a certain way to make it reusable and easily accessible are all aspects that are not new to historians. Computer science is currently approaching a solution to some of these problems, or at least making it easier to work with historical data. In this paper, we propose a historical knowledge representation model taking into consideration the quality of imperfection of historical data in terms of uncertainty. To do this, our model design is based on a multilayer approach in which we distinguish three informational levels: information, source, and belief whose combination allows modeling and modulating historical knowledge. The basic principle of this model is to allow multiple historical sources to represent several versions of the history of a historical event with associated degrees of belief. In our model, we differentiated three levels of granularity (attribute, object, relation) to express belief and defined 11 degrees of uncertainty in belief. The proposed model can be the object of various exploitations that fall within the historian’s decision-making support for the plausibility of the history of historical events.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127971101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS) 基于Mamdani模糊推理系统(MFIS)的云和物联网智能停车系统
ISC Int. J. Inf. Secur. Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.20
T. Alyas, Gulzar Ahmad, Yousaf Saeed, Muhammad Asif, Umer Farooq, Asma Kanwal
{"title":"Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System (MFIS)","authors":"T. Alyas, Gulzar Ahmad, Yousaf Saeed, Muhammad Asif, Umer Farooq, Asma Kanwal","doi":"10.22042/ISECURE.2019.11.0.20","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.20","url":null,"abstract":"Internet of Things (IoT) and cloud computing technologies have connected the infrastructure of the city to make the context-aware and more intelligent city for utility its major resources. These technologies have much potential to solve thechallenges of urban areas around the globe to facilitate the citizens. A framework model that enables the integration of sensor’s data and analysis of the data in the context of smart parking is proposed. These technologies use sensors anddevices deployed around the city parking areas sending real time data through the edge computers to the main cloud servers. Mobil-Apps are developed that used real time data, set from servers of the parking facilities in the city. Fuzzification is shown to be a capable mathematical approach for modeling city parking issues. To solve the city parking problems in cities a detailed analysis of fuzzy logic proposed systems is developed. This paper presents the resultsachieved using Mamdani Fuzzy Inference System to model complex smart parking system. These results are verified using MATLAB simulation.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114077612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluating Multipath TCP Resilience against Link Failures 评估多路径TCP对链路故障的弹性
ISC Int. J. Inf. Secur. Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.15
Mohammed J. F. Alenazi
{"title":"Evaluating Multipath TCP Resilience against Link Failures","authors":"Mohammed J. F. Alenazi","doi":"10.22042/ISECURE.2019.11.0.15","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.15","url":null,"abstract":"Standard TCP is the de facto reliable transfer protocol for the Internet. It is designed to establish a reliable connection using only a single network interface. However, standard TCP with single interfacing performs poorly due to intermittent node connectivity. This requires the re-establishment of connections as the IP addresses change. Multi-path TCP (MPTCP) has emerged to utilize multiple network interfaces in order to deliver higher throughput. Resilience to link failures can be better supported in MPTCP as the segments’ communication are maintained via alternative interfaces. In this paper, the resilience of MPTCP to link failures against several challenges is evaluated. Several link failure scenarios are applied to examine all aspects of MPTCP including congestion algorithms, path management, and subflow scheduling. In each scenario, the behavior of MPTCP is studied by observing and analyzing the throughput and delay. The evaluation of the results indicates MPTCP resilience to a low number of failed links. However, as the number of failed links increases, MPTCP can only recover full throughput if the link failure occurs on the server side. In addition, in the presence of link failures, the lowestRTT MPTCP scheduler yields the shortest delivery time while providing the minimum application jitter.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129975531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Access and Mobility Policy Control at the Network Edge 网络边缘的访问和移动策略控制
ISC Int. J. Inf. Secur. Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.14
E. Pencheva, I. Atanasov, Ivaylo Asenov
{"title":"Access and Mobility Policy Control at the Network Edge","authors":"E. Pencheva, I. Atanasov, Ivaylo Asenov","doi":"10.22042/ISECURE.2019.11.0.14","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.14","url":null,"abstract":"The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications may provide intelligence in the vicinity of end users which improves network performance and enhances user experience. In this paper, we propose new mobile edge API to access and control the mobility at the network edge. The application logic for provisioning access and mobility policies may be based on considerations like load level information per radio network slice instance, user location, accumulated usage, local policy, etc. We describe the basic API functionality by typical use cases and provide the respective data model, which represents the resource structure and data types. Some implementation aspects, related to modeling the resource states as seen by a mobile edge application and by the network, are discussed.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116320591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hand Gestures Classification with Multi-Core DTW 基于多核DTW的手势分类
ISC Int. J. Inf. Secur. Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.12
Ayman Atia, Nada Shorim
{"title":"Hand Gestures Classification with Multi-Core DTW","authors":"Ayman Atia, Nada Shorim","doi":"10.22042/ISECURE.2019.11.0.12","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.12","url":null,"abstract":"Classifications of several gesture types are very helpful in several applications. This paper tries to address fast classifications of hand gestures using DTW over multi-core simple processors. We presented a methodology to distribute templates over multi-cores and then allow parallel execution of the classification. The results were presented to voting algorithm in which the majority vote was used for the classification purpose. The speed of processing has increased dramatically due to using multi-core processors and DTW.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124370623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain 功率域中非正交多址的公平功率分配
ISC Int. J. Inf. Secur. Pub Date : 2019-08-01 DOI: 10.22042/ISECURE.2019.11.0.16
Joel E. Cordeiro Junior, M. Alencar, J. V. S. Filho, K. Assis
{"title":"A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain","authors":"Joel E. Cordeiro Junior, M. Alencar, J. V. S. Filho, K. Assis","doi":"10.22042/ISECURE.2019.11.0.16","DOIUrl":"https://doi.org/10.22042/ISECURE.2019.11.0.16","url":null,"abstract":"This paper presents an investigation on the performance of the Non-Orthogonal Multiple Access (NOMA) in the power domain scheme. A Power Allocation (PA) method is proposed from NOMA throughput expression analysis. This method aims to provide fair opportunities for users to improve their performance. Thus, NOMA users can achieve rates higher than, or equal to, the rates obtained with the conventional Orthogonal Multiple Access (OMA) in the frequency domain schemes. The proposed method is evaluated and compared with others PA techniques by computer system level simulations. The results obtained indicate that the proposed method increases the average cell spectral efficiency andmaintains a good fairness level with regard to the resource allocation among the users within a cell.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130177971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信