network servers
Recently Published Documents


TOTAL DOCUMENTS

71
(FIVE YEARS 11)

H-INDEX

9
(FIVE YEARS 0)

2021 ◽  
Vol 33 (6) ◽  
pp. 0-0

Personalized information retrieval is an effective tool to solve the problem of information overload. Along with the rapid development of emerging network technologies such as cloud computing, however, network servers are becoming more and more untrusted, resulting in a serious threat to user privacy of personalized information retrieval. In this paper, we propose a basic framework for the comprehensive protection of all kinds of user privacy in personalized information retrieval. Its basic idea is to construct and submit a group of well-designed dummy requests together with each user request to the server, to mix up the user requests and then cover up the user privacy behind the requests. Also, the framework includes a privacy model and its implementation algorithm. Finally, theoretical analysis and experimental evaluation demonstrate that the framework can comprehensively improve the security of all kinds of user privacy, without compromising the availability of personalized information retrieval.


Entropy ◽  
2021 ◽  
Vol 23 (7) ◽  
pp. 894
Author(s):  
Ireneusz Mrozek ◽  
Vyacheslav N. Yarmolik

An important achievement in the functional diagnostics of memory devices is the development and application of so-called transparent testing methods. This is especially important for modern computer systems, such as embedded systems, systems and networks on chips, on-board computer applications, network servers, and automated control systems that require periodic testing of their components. This article analyzes the effectiveness of existing transparent tests based on the use of the properties of data stored in the memory, such as changing data and their symmetry. As a new approach for constructing transparent tests, we propose to use modified address sequences with duplicate addresses to reduce the time complexity of tests and increase their diagnostic abilities.


2021 ◽  
Vol 15 (1) ◽  
pp. 44-64
Author(s):  
Hatem Mahmoud Salama ◽  
Mohamed Zaki Abd El Mageed ◽  
Gouda Ismail Mohamed Salama ◽  
Khaled Mahmoud Badran

Many MANET research works are based on the popular informal definition that MANET is a wireless ad-hoc network that has neither infrastructure nor backbone and every network node is autonomous and moves depending on its mobility. Unfortunately, this definition pays no attention to the network servers that are essential in core-based, mission-critical, and military MANETs. In core-based MANETs, external intrusion detection systems (IDS) cannot detect internal Byzantine attacks; in addition, internal Byzantine fault tolerant (BFT) systems are unqualified to detect typical external wireless attack. Therefore, there is a real need to combine both internal and external mobile ad-hoc network (MANET) ID systems. Here, CSMCSM is presented as a two-level client server model for comprehensive security in MANETs that integrates internal and external attack detectors in one device. The internal component is based on a BFT consensus algorithm while the external component employs decision tree to classify the MANET attacks.


2020 ◽  
Vol 26 (11) ◽  
pp. 1435-1454
Author(s):  
Łukasz Apiecionek ◽  
Matusz Biedziak

One of huge problem for recent IT systems are attacks on their resources called Distributed Denial of Service attacks. Many servers which are accessible from public network were a victim of such attacks or could be in the future. Unfortunately, there is still no effective method for protecting network servers against source of the attack, while such attack could block network resources for many hours. Existing solutions for protecting networks and IoT systems are using mainly firewalls and IDS/IPS mechanisms, which is not sufficient. This article presents the method minimizing the DDoS attacks. Proposed method provides possibilities for the network administrators to protect their servers and IoT network resources during the attack. The proposed fuzzy adaptive algorithm is using Ordered Fuzzy Numbers for predicting amount of packets which could be passed over the network boarder gateway. Proposed solution will give the opportunity for ordinary users to finish their work when the attack occurs.


2020 ◽  
Vol 70 (2) ◽  
pp. 239-244
Author(s):  
D.N. Issabayeva ◽  
◽  
Sh.T. Shekerbekova ◽  

The article describes the advantages of the use of cloud technologies in training and theoretical researches of the scientific literature. "Cloud technology" appeared in a result of evolution of information technology over the last decade. The term "cloud technology" frequently found in scientific and technical literature. This term denotes a model of network access on-demand to a common set of configurable computing resources (network, servers, storage, applications, services) that can be quickly prepared for work; wherein the part of the user requires minimal interaction with the service provider, just having a computer device having access to the Internet. The idea of using "cloud technology" in the course of training, transfer of educational-methodical documentation, theoretical and practical exercises in the Internet is literally "in the air". Cloud computing has a great future, so all who are close to IT should master this technology


Author(s):  
Seung-Jun Cha ◽  
Seung Hyub Jeon ◽  
Ramneek Ramneek ◽  
Yeon Jeong Jeong ◽  
Jin Mee Kim ◽  
...  
Keyword(s):  

Author(s):  
Nik Sultana ◽  
Achala Rao ◽  
Zihao Jin ◽  
Pardis Pashakhanloo ◽  
Henry Zhu ◽  
...  

2019 ◽  
Vol 99 ◽  
pp. 104-112
Author(s):  
Sanghyeon Baeg ◽  
Mirza Qasim ◽  
Junhyeong Kwon ◽  
Tan Li ◽  
Nilay Gupta ◽  
...  
Keyword(s):  

PRANATA HUKUM ◽  
2019 ◽  
Vol 14 (2) ◽  
pp. 165-176
Author(s):  
Aryana Wisastra ◽  
Baharudin ◽  
Indah Satria

Indonesia began to regulate the procurement of goods/services electronically from the government since 2010. This is indicated by the appointed Presidential regulation number 54 year 2010 as amended by Presidential Regulation No. 4 year 2015, then amended again to be presidential Regulation No. 16 year 2018 on procurement of goods/services Government. The problem that will be discussed is how the implementation of goods procurement/Government services are reviewed from the Presidential Decree No. 16 of 2018 at the Land Office of Bandar Lampung, what are the inhibitory factors in the implementation of the procurement of goods/services in the Office Land of Bandar Lampung. The research methods used are normative and empirical juridical, using secondary and primary data. Results of the research from the implementation of goods procurement/Government Services reviewed from Presidential Decree No. 16 of 2018 in the Land office of Bandar Lampung now has referred to the Presidential Decree No. 16 of 2018, the inhibitory factor in the implementation of goods /services in the Land office of Bandar Lampung City, among others, lack of human resources that have a certificate of expertise, network/servers that are frequent disruptions and difficult when creating the approximate price yourself.


Sign in / Sign up

Export Citation Format

Share Document