3 research outputs found
Performance Analysis of Traffic and Mobility Models on Mobile and Vehicular Ad Hoc Wireless Networks
Advances in wireless communication technology and the proliferation of mobile devices enable the capa-
bilities of communicating with each other even in areas with no pre-existing communication infrastructure.
Traffic and mobility models play an important role in evaluating the performance of these communication
networks. Despite criticism and assumption from various researches on Transmission Control Protocols
(TCP), weaknesses on Mobile Ad Hoc Network (MANET), and Vehicular Ad Hoc Network (VANET).
A simulation was carried out to evaluate the performance of Constant Bit Rate, Variable Bit Rate and
Transmission Control Protocol on MANET and VANET using DSR routing protocol. CBR, VBR, and TCP
have different manufacturer operation mechanisms and these differences lead to significant performance
of CBR and VBR over TCP with better throughput and less average maximal end-to-end delay. DSR
was able to respond to link failure at low mobility which led to TCP’s performance in packets delivery
Security Applications of Formal Language Theory
We present an approach to improving the security of complex, composed systems based on formal language theory, and show how this approach leads to advances in input validation, security modeling, attack surface reduction, and ultimately, software design and programming methodology. We cite examples based on real-world security flaws in common protocols representing different classes of protocol complexity. We also introduce a formalization of an exploit development technique, the parse tree differential attack, made possible by our conception of the role of formal grammars in security. These insights make possible future advances in software auditing techniques applicable to static and dynamic binary analysis, fuzzing, and general reverse-engineering and exploit development.
Our work provides a foundation for verifying critical implementation components with considerably less burden to developers than is offered by the current state of the art. It additionally offers a rich basis for further exploration in the areas of offensive analysis and, conversely, automated defense tools and techniques.
This report is divided into two parts. In Part I we address the formalisms and their applications; in Part II we discuss the general implications and recommendations for protocol and software design that follow from our formal analysis
Selected Computing Research Papers Volume 2 June 2013
An Evaluation of Current Innovations for Solving Hard Disk Drive Vibration Problems (Isiaq Adeola) ........................................................................................................ 1
A Critical Evaluation of the Current User Interface Systems Used By the Blind and Visually Impaired (Amneet Ahluwalia) ................................................................................ 7
Current Research Aimed At Improving Bot Detection In Massive Multiplayer Online Games (Jamie Burnip) ........................................................................................................ 13
Evaluation Of Methods For Improving Network Security Against SIP Based DoS Attacks On VoIP Network Infrastructures (David Carney) ................................................ 21
An Evaluation of Current Database Encryption Security Research (Ohale Chidiebere) .... 29
A Critical Appreciation of Current SQL Injection Detection Methods
(Lee David Glynn) .............................................................................................................. 37
An Analysis of Current Research into Music Piracy Prevention (Steven Hodgson) .......... 43
Real Time On-line Analytical Processing: Applicability Of Parallel Processing Techniques (Kushatha Kelebeng) ....................................................................................... 49
Evaluating Authentication And Authorisation Method Implementations To Create A More Secure System Within Cloud Computing Technologies (Josh Mallery) ................... 55
A Detailed Analysis Of Current Computing Research Aimed At Improving Facial Recognition Systems (Gary Adam Morrissey) ................................................................... 61
A Critical Analysis Of Current Research Into Stock Market Forecasting Using Artificial Neural Networks (Chris Olsen) ........................................................................... 69
Evaluation of User Authentication Schemes (Sukhdev Singh) .......................................... 77
An Evaluation of Biometric Security Methods for Use on Mobile Devices
(Joe van de Bilt) .................................................................................................................. 8