100 research outputs found

    Graphs behind data: A network-based approach to model different scenarios

    Get PDF
    openAl giorno d’oggi, i contesti che possono beneficiare di tecniche di estrazione della conoscenza a partire dai dati grezzi sono aumentati drasticamente. Di conseguenza, la definizione di modelli capaci di rappresentare e gestire dati altamente eterogenei è un argomento di ricerca molto dibattuto in letteratura. In questa tesi, proponiamo una soluzione per affrontare tale problema. In particolare, riteniamo che la teoria dei grafi, e più nello specifico le reti complesse, insieme ai suoi concetti ed approcci, possano rappresentare una valida soluzione. Infatti, noi crediamo che le reti complesse possano costituire un modello unico ed unificante per rappresentare e gestire dati altamente eterogenei. Sulla base di questa premessa, mostriamo come gli stessi concetti ed approcci abbiano la potenzialità di affrontare con successo molti problemi aperti in diversi contesti. ​Nowadays, the amount and variety of scenarios that can benefit from techniques for extracting and managing knowledge from raw data have dramatically increased. As a result, the search for models capable of ensuring the representation and management of highly heterogeneous data is a hot topic in the data science literature. In this thesis, we aim to propose a solution to address this issue. In particular, we believe that graphs, and more specifically complex networks, as well as the concepts and approaches associated with them, can represent a solution to the problem mentioned above. In fact, we believe that they can be a unique and unifying model to uniformly represent and handle extremely heterogeneous data. Based on this premise, we show how the same concepts and/or approach has the potential to address different open issues in different contexts. ​INGEGNERIA DELL'INFORMAZIONEopenVirgili, Luc

    An Optimised Shortest Path Algorithm for Network Rotuting & SDN: Improvement on Bellman-Ford Algorithm

    Get PDF
    Network routing algorithms form the backbone of data transmission in modern network architectures, with implications for efficiency, speed, and reliability. This research aims to critically investigate and compare three prominent routing algorithms: Bellman-Ford, Shortest Path Faster Algorithm (SPFA), and our novel improved variant of Bellman-Ford, the Space-efficient Cost-Balancing Bellman-Ford (SCBF). We evaluate the performance of these algorithms in terms of time and space complexity, memory utilization, and routing efficacy, within a simulated network environment. Our results indicate that while Bellman-Ford provides consistent performance, both SPFA and SCBF present improvements in specific scenarios with the SCBF showing notable enhancements in space efficiency. The innovative SCBF algorithm provides competitive performance and greater space efficiency, potentially making it a valuable contribution to the development of network routing protocols. Further research is encouraged to optimize and evaluate these algorithms in real-world network conditions. This study underscores the continuous need for algorithmic innovation in response to evolving network demands

    New Metropolitan Perspectives

    Get PDF
    ​This open access book presents the outcomes of the symposium “NEW METROPOLITAN PERSPECTIVES,” held at Mediterranea University, Reggio Calabria, Italy on May 26–28, 2020. Addressing the challenge of Knowledge Dynamics and Innovation-driven Policies Towards Urban and Regional Transition, the book presents a multi-disciplinary debate on the new frontiers of strategic and spatial planning, economic programs and decision support tools in connection with urban–rural area networks and metropolitan centers. The respective papers focus on six major tracks: Innovation dynamics, smart cities and ICT; Urban regeneration, community-led practices and PPP; Local development, inland and urban areas in territorial cohesion strategies; Mobility, accessibility and infrastructures; Heritage, landscape and identity;and Risk management,environment and energy. The book also includes a Special Section on Rhegion United Nations 2020-2030. Given its scope, the book will benefit all researchers, practitioners and policymakers interested in issues concerning metropolitan and marginal areas

    Leveraging Conventional Internet Routing Protocol Behavior to Defeat DDoS and Adverse Networking Conditions

    Get PDF
    The Internet is a cornerstone of modern society. Yet increasingly devastating attacks against the Internet threaten to undermine the Internet\u27s success at connecting the unconnected. Of all the adversarial campaigns waged against the Internet and the organizations that rely on it, distributed denial of service, or DDoS, tops the list of the most volatile attacks. In recent years, DDoS attacks have been responsible for large swaths of the Internet blacking out, while other attacks have completely overwhelmed key Internet services and websites. Core to the Internet\u27s functionality is the way in which traffic on the Internet gets from one destination to another. The set of rules, or protocol, that defines the way traffic travels the Internet is known as the Border Gateway Protocol, or BGP, the de facto routing protocol on the Internet. Advanced adversaries often target the most used portions of the Internet by flooding the routes benign traffic takes with malicious traffic designed to cause widespread traffic loss to targeted end users and regions. This dissertation focuses on examining the following thesis statement. Rather than seek to redefine the way the Internet works to combat advanced DDoS attacks, we can leverage conventional Internet routing behavior to mitigate modern distributed denial of service attacks. The research in this work breaks down into a single arc with three independent, but connected thrusts, which demonstrate that the aforementioned thesis is possible, practical, and useful. The first thrust demonstrates that this thesis is possible by building and evaluating Nyx, a system that can protect Internet networks from DDoS using BGP, without an Internet redesign and without cooperation from other networks. This work reveals that Nyx is effective in simulation for protecting Internet networks and end users from the impact of devastating DDoS. The second thrust examines the real-world practicality of Nyx, as well as other systems which rely on real-world BGP behavior. Through a comprehensive set of real-world Internet routing experiments, this second thrust confirms that Nyx works effectively in practice beyond simulation as well as revealing novel insights about the effectiveness of other Internet security defensive and offensive systems. We then follow these experiments by re-evaluating Nyx under the real-world routing constraints we discovered. The third thrust explores the usefulness of Nyx for mitigating DDoS against a crucial industry sector, power generation, by exposing the latent vulnerability of the U.S. power grid to DDoS and how a system such as Nyx can protect electric power utilities. This final thrust finds that the current set of exposed U.S. power facilities are widely vulnerable to DDoS that could induce blackouts, and that Nyx can be leveraged to reduce the impact of these targeted DDoS attacks

    New Metropolitan Perspectives

    Get PDF
    ​This open access book presents the outcomes of the symposium “NEW METROPOLITAN PERSPECTIVES,” held at Mediterranea University, Reggio Calabria, Italy on May 26–28, 2020. Addressing the challenge of Knowledge Dynamics and Innovation-driven Policies Towards Urban and Regional Transition, the book presents a multi-disciplinary debate on the new frontiers of strategic and spatial planning, economic programs and decision support tools in connection with urban–rural area networks and metropolitan centers. The respective papers focus on six major tracks: Innovation dynamics, smart cities and ICT; Urban regeneration, community-led practices and PPP; Local development, inland and urban areas in territorial cohesion strategies; Mobility, accessibility and infrastructures; Heritage, landscape and identity;and Risk management,environment and energy. The book also includes a Special Section on Rhegion United Nations 2020-2030. Given its scope, the book will benefit all researchers, practitioners and policymakers interested in issues concerning metropolitan and marginal areas

    Analysis and design of security mechanisms in the context of Advanced Persistent Threats against critical infrastructures

    Get PDF
    Industry 4.0 can be defined as the digitization of all components within the industry, by combining productive processes with leading information and communication technologies. Whereas this integration has several benefits, it has also facilitated the emergence of several attack vectors. These can be leveraged to perpetrate sophisticated attacks such as an Advanced Persistent Threat (APT), that ultimately disrupts and damages critical infrastructural operations with a severe impact. This doctoral thesis aims to study and design security mechanisms capable of detecting and tracing APTs to ensure the continuity of the production line. Although the basic tools to detect individual attack vectors of an APT have already been developed, it is important to integrate holistic defense solutions in existing critical infrastructures that are capable of addressing all potential threats. Additionally, it is necessary to prospectively analyze the requirements that these systems have to satisfy after the integration of novel services in the upcoming years. To fulfill these goals, we define a framework for the detection and traceability of APTs in Industry 4.0, which is aimed to fill the gap between classic security mechanisms and APTs. The premise is to retrieve data about the production chain at all levels to correlate events in a distributed way, enabling the traceability of an APT throughout its entire life cycle. Ultimately, these mechanisms make it possible to holistically detect and anticipate attacks in a timely and autonomous way, to deter the propagation and minimize their impact. As a means to validate this framework, we propose some correlation algorithms that implement it (such as the Opinion Dynamics solution) and carry out different experiments that compare the accuracy of response techniques that take advantage of these traceability features. Similarly, we conduct a study on the feasibility of these detection systems in various Industry 4.0 scenarios

    Society, History and Education: dialogues from a disciplinary perspective

    Get PDF
    We are pleased to present to the entire academic community and the general public the following work, which contains recent research results of a group of teachers from the Faculty of Educational Sciences in areas such as pedagogy, communication, technology and history. This publication is the result of the work coordinated by the Vice Rector's Office for Research, Innovation and Extension of the UTP, with the support of the Faculty of Education Sciences, through the realization of the First Conference on Social Appropriation of Knowledge held in 2022, in order to reach a wider field of dissemination of local research. In the first chapter "Sentiment analysis on Twitter about mobile learning" by professors Rosa María Guilleumas García and Hernán Gil Ramírez, a study of tweets about mobile learning is presented. To do so, the authors combined several techniques of social network analysis, text mining and sentiment analysis, using NodeXL software, specialized in network examination and visualization. Among their results, they highlight the great predominance of positive tweets over negative ones in this field of study, and at the same time point out that, in the analyzed tweets, the most used words were learning, mobile, app, machine, mlearning and education. In second place, there is the chapter "The institutional educational project. An opportunity for reflection and transformation of the Colombian university" by teachers Martha Cecilia Gutiérrez Giraldo and Carolina Franco Ossa, which arises from the reflection on university autonomy and its internal exercise in the construction of its Institutional Educational Projects (PEI). Thus, the main purpose of this work is to identify the relevant facts that have marked the academic life of the UTP since its creation in 1958 until 2015, in which the different strata of the university community (teachers, students, administrators, managers, graduates and the social sector) participated through a participatory action research process. The results show that since its creation, the University has updated its academic and management policies in accordance with the regulations in force in each period, and that, at the same time, as mentioned by the authors, the institutional processes of self-reflection and projection of the academic life of the UTP should be strengthened through the culture of academic and democratic participation, supported by the collaborative work of the university communityCONTENT Presentation...................................................................................................................5 CHAPTER ONE Twitter sentiment analysis on mobile learning ...............................................................9 Rosa María Guilleumas García y Hernán Gil Ramírez CHAPTER TWO The institutional educational project. an opportunity for reflection and transformation of the Colombian university.................................................................37 Martha Cecilia Gutiérrez Giraldo y Carolina Franco Ossa CHAPTER THREE The Ridway´s photographies: typologies of portraiture in Pereira, Colombia .............59 Johana Guarín Medina CHAPTER FOUR Information society. Political disputes and disciplinary openings................................91 Andrés Camilo Agudelo Vergara CHAPTER FIVE State and internal borders in the 19th century: the Quindío mountain in central western Colombia .......................................................................1
    corecore