scholarly journals Detection of Misconfigured BYOD Devices in Wi-Fi Networks

2020 ◽  
Vol 10 (20) ◽  
pp. 7203 ◽  
Author(s):  
Jaehyuk Choi

As Bring Your Own Device (BYOD) policy has become widely accepted in the enterprise, anyone with a mobile device that supports Wi-Fi tethering can provide an active wireless Internet connection to other devices without restriction from network administrators. Despite the potential benefits of Wi-Fi tethering, it raises new security issues. The open source nature of mobile operating systems (e.g., Google Android or OpenWrt) can be easily manipulated by selfish users to provide an unfair advantage throughput performance to their tethered devices. The unauthorized tethering can interfere with nearby well-planned access points (APs) within Wi-Fi networks, which results in serious performance problems. In this paper, we first conduct an extensive evaluation study and demonstrate that the abuse of Wi-Fi tethering that adjusts the clear channel access parameters has strong adverse effects in Wi-Fi networks, while providing the manipulated device a high throughput gain. Subsequently, an online detection scheme diagnoses the network condition and detects selfish tethering devices by passively exploiting the packet loss information of on-going transmissions. Our evaluation results show that the proposed method accurately distinguishes the manipulated tethering behavior from other types of misbehavior, including the hidden node problem.

2021 ◽  
Author(s):  
Katarzyna Stapor ◽  
Krzysztof Kotowski ◽  
Tomasz Smolarczyk ◽  
Irena Roterman

Abstract Background: The importance of protein secondary structure (SS) prediction is widely known, its solution enables learning about the role of a protein in organisms. As the experimental methods are expensive and sometimes impossible, many SS predictors, mainly based on different machine learning methods have been proposed for many years. SS prediction as the imbalanced classification problem should not be judged by the commonly used Q3/Q8 metrics. Moreover, as the benchmark datasets are not random samples, the classical statistical null hypothesis testing based on the Neyman-Pearson approach is not appropriate. Also, the state-of-the-art predictors have usually relatively long prediction times.Results: We present a new deep network ProteinUnet2 for SS prediction which is based on U-Net convolutional architecture. We also propose a new statistical methodology for prediction performance assessment based on the significance from Fisher-Pitman permutation tests accompanied by practical significance measured by Cohen’s effect size. Through an extensive evaluation study, we report the performance of ProteinUnet2 in comparison with two state-of-the-art methods SAINT and SPOT-1D on benchmark datasets TEST2016, TEST2018, and CASP12. Conclusions: Our results suggest that ProteinUnet2 has much shorter prediction times while maintaining (or outperforming) the mentioned predictors. We strongly believe that our proposed statistical methodology will be adopted and used (and even expanded) by the research community.


Author(s):  
Kijpokin Kasemsap

This chapter reveals the prospect of mobile commerce (m-commerce); m-commerce and trust; m-commerce, privacy, and security issues; m-commerce adoption and technology acceptance model (TAM); and the significant perspectives on m-commerce. M-commerce is used for business transactions conducted by mobile phones for the promotional and financial activities using the wireless Internet connectivity. M-commerce is the important way to purchase the online items through online services. The main goal of m-commerce is to ensure that customers' shopping experience is well-suited to the smaller screen sizes that they can see on smartphones and tablets. Computer-mediated networks enable these transaction processes through electronic store searches and electronic point-of-sale capabilities. M-commerce brings the new possibility for businesses to sell and promote their products and services toward gaining improved productivity and business growth.


Author(s):  
Kijpokin Kasemsap

This chapter reveals the prospect of mobile commerce (m-commerce); m-commerce and trust; m-commerce, privacy, and security issues; m-commerce adoption and technology acceptance model (TAM); and the significant perspectives on m-commerce. M-commerce is used for business transactions conducted by mobile phones for the promotional and financial activities using the wireless Internet connectivity. M-commerce is the important way to purchase the online items through online services. The main goal of m-commerce is to ensure that customers' shopping experience is well-suited to the smaller screen sizes that they can see on smartphones and tablets. Computer-mediated networks enable these transaction processes through electronic store searches and electronic point-of-sale capabilities. M-commerce brings the new possibility for businesses to sell and promote their products and services toward gaining improved productivity and business growth.


SAGE Open ◽  
2015 ◽  
Vol 5 (2) ◽  
pp. 215824401558037 ◽  
Author(s):  
Morufu Olalere ◽  
Mohd Taufik Abdullah ◽  
Ramlan Mahmod ◽  
Azizol Abdullah

Author(s):  
Maria Economou ◽  
Laia Pujol Tost

Virtual reality applications offer various possibilities for cultural heritage interpretation, such as giving users the feeling of immersion and appealing to all their senses, making their experience lively and memorable. In order to test their effectiveness for assisting learning and successful integration in exhibitions, the authors carried out an extensive evaluation study using three case studies: the exhibition “Immaginare Roma Antica” at the Trajan Markets, Rome; the permanent displays at the Ename Museum, Belgium; and the VR displays at Hellenic Cosmos, Foundation of the Hellenic World, Athens. The chapter analyses how the applications were used, the type of learning different systems supported, how this was affected by the conditions of use, and their suitability for different groups. It also offers guidelines on evaluation methodology when studying the use of ICT in cultural settings. The study contributes to the construction of a substantial body of empirical and methodological knowledge aimed at guiding future designs and evaluations of ICT tools in exhibitions.


Author(s):  
Marissa A. Vallette ◽  
Barrett S. Caldwell

Electronic health records (EHRs) are becoming an important aspect of how members of a healthcare organization organize and share patient information effectively and efficiently in patient care. EHRs can provide substantial potential benefits to healthcare providers, if roles and tasks are well coordinated between providers and patients. Poor or incompatible implementation of the EHR and information flow between patients and providers represents barriers to accurate and valid information dissemination. The authors’ research expands on previous studies, and examines privacy and security issues and the perspective of distributed expertise incorporating both providers and patients. The case study to be highlighted examines patient and provider perspectives of expertise, communication effectiveness, and the sharing of information (with and without the EHR) in outpatient OB/GYN clinical care.


2017 ◽  
Author(s):  
Pathan Aiyaz Khan

Network which is not connected by any type of cable is a wireless network. The main purpose of using wireless network is that it enables users to avoid the cost of introducing cable lines in the building or making connection between different locations. These networks are highly affected by network attack. One of these attacks are black hole attacks in which malicious node claims that it has the fresh and shortest path. As MANET doesn't have any standard infrastructure and the dynamic topology that makes these networks highly susceptible to security flaws like exploiting vulnerabilities to routing protocols and transferring harmful packets in the networks. These security issues results in adverse effect on this network. Now the task is to prevent MANET from these security threats. As this paper is based on DSR protocol hence we developed a scheme called the Cooperative Bait Detection Scheme (CBDS), which directly focus on detection and prevention of malicious nodes introducing gray hole/black hole attacks in MANETs. To implement this CBDS we use back tracing method. Hence from our proposed system we won't require any special hardware or detection node to prevent against blackhole attacks.


2017 ◽  
Author(s):  
Isha Bhan

Mobile ad-hoc networks (MANET) are a primary requirement for the establishment of communication. CBDS has a reverse tracking mechanism which checks all the stated issues. CBDS outperforms among nodes. The malicious nodes may lead to security concerns such as it may disrupt the routing process. Since it is a Manet, it can change its scale anytime so preventing or detecting the malicious node becomes a challenge. This paper tries to solve the issue by applying a dynamic source route mechanism which is also referred as cooperative bait detection scheme (CBDS). CBDS technique integrates the advantage of both proactive and reactive mechanisms much better than the previous mechanisms like BFTR, 2ACK.


Sign in / Sign up

Export Citation Format

Share Document