Ensemble Clustering for Internet Security Applications

Author(s):  
Weiwei Zhuang ◽  
Yanfang Ye ◽  
Yong Chen ◽  
Tao Li
2010 ◽  
Vol 81 (1) ◽  
pp. 162-171 ◽  
Author(s):  
A. V. Kelarev ◽  
J. L. Yearwood ◽  
P. Watters ◽  
X. Wu ◽  
J. H. Abawajy ◽  
...  

2010 ◽  
Vol 03 (03) ◽  
pp. 435-442
Author(s):  
Andrei Kelarev ◽  
John Yearwood ◽  
Paul Watters

This article is motivated by internet security applications of multiple classifiers designed for the detection of malware. Following a standard approach in data mining, Dazeley et al. (Asian-European J. Math. 2 (2009)(1) 41–56) used Gröbner-Shirshov bases to define a family of multiple classifiers and develop an algorithm optimizing their properties.The present article complements and strengthens these results. We consider a broader construction of classifiers and develop a new and more general algorithm for the optimization of their essential properties.


2013 ◽  
Vol 5 (1) ◽  
pp. 36-41
Author(s):  
R. Ganesh ◽  
◽  
Ch. Sandeep Reddy ◽  

Author(s):  
P. Jeyadurga ◽  
S. Ebenezer Juliet ◽  
I. Joshua Selwyn ◽  
P. Sivanisha

The Internet of things (IoT) is one of the emerging technologies that brought revolution in many application domains such as smart cities, smart retails, healthcare monitoring and so on. As the physical objects are connected via internet, security risk may arise. This paper analyses the existing technologies and protocols that are designed by different authors to ensure the secure communication over internet. It additionally focuses on the advancement in healthcare systems while deploying IoT services.


Chaotic systems behavior attracts many researchers in the field of image encryption. The major advantage of using chaos as the basis for developing a crypto-system is due to its sensitivity to initial conditions and parameter tunning as well as the random-like behavior which resembles the main ingredients of a good cipher namely the confusion and diffusion properties. In this article, we present a new scheme based on the synchronization of dual chaotic systems namely Lorenz and Chen chaotic systems and prove that those chaotic maps can be completely synchronized with other under suitable conditions and specific parameters that make a new addition to the chaotic based encryption systems. This addition provides a master-slave configuration that is utilized to construct the proposed dual synchronized chaos-based cipher scheme. The common security analyses are performed to validate the effectiveness of the proposed scheme. Based on all experiments and analyses, we can conclude that this scheme is secure, efficient, robust, reliable, and can be directly applied successfully for many practical security applications in insecure network channels such as the Internet


Sign in / Sign up

Export Citation Format

Share Document