278 research outputs found
Keyword based categorisation of diary entries to support personal Internet content pre-caching on mobile devices
This paper presents a study into the effectiveness of our algorithm for automatic categorisation of real users' diary entries, as a first step towards personal Internet content pre-caching on mobile devices. The study reports an experiment comparing trial subjects allocations of 99 diary entries to those predicted by a keyword-based algorithm. While leaving considerable grounds for improvement, results are positive and show pave the way for supporting mobile services based on categorising users' diary entries
Calendar based contextual information as an Internet content pre-caching tool
Motivated by the need to access internet content on mobile devices with expensive or non-existent network access, this paper discusses the possibility for contextual information extracted from electronic calendars to be used as sources for Internet content predictive retrieval (pre-caching). Our results show that calendar based contextual information is useful for this purpose and that calendar based information can produce web queries that are relevant to the users' task supportive information needs
Augmenting entry: the possibilities for utilizing geo-referenced information to improve mobile calendar applications
Today's mobile communication devices often offer extensive calendar facilities. However the use of these is often very limited through cumbersome interfaces and inappropriate designs for small devices. Prompted by previous work in mobile calendar usability, this paper discusses how augmentation of calendar entries with mobile spatial information could provide potential advantages and improve the usability of an electronic calendar
Recommended from our members
ForChaos: Real Time Application DDoS detection using Forecasting and Chaos Theory in Smart Home IoT Network
Recently, D/DoS attacks have been launched by zombie IoT devices in smart home networks. They pose a great threat to to network systems with Application Layer DDoS attacks being especially hard to detect due to their stealth and seemingly legitimacy. In this paper, we propose we propose ForChaos, a lightweight detection algorithm for IoT devices, that is based on forecasting and chaos theory to identify flooding and DDoS attacks. For every time-series behaviour collected, a forecasting-technique prediction is generated, based on a number of features, and the error between the two values is calcualted. In order to assess the error of the forecasting from the actual value, the lyapunov exponent is used to detect potential malicious behaviour. In NS-3 we evaluate our detection algorithm through a series of experiments in Flooding and Slow-Rate DDoS attacks. The results are presented and discussed in detail and compared with related studies, demonstrating its effectiveness and robustness
Recommended from our members
The Lord of the Sense: A Privacy Preserving Reputation System for Participatory Sensing Applications
Electronic devices we use on a daily basis collect sensitive information without preserving user’s privacy. In this paper, we propose the lord of the sense (LotS), a privacy pre- serving reputation system for participatory sensing applications. Our system maintains the privacy and anonymity of information with the use of cryptographic techniques and combines voting approaches to support users’ reputation. Furthermore, LotS maintains accountability by tracing back a misbehaving user while maintaining k-anonymity. A detailed security analysis is presented with the current advantages and disadvantages of our system
Recommended from our members
Protection of an intrusion detection engine with watermarking in ad hoc networks
Mobile ad hoc networks have received great attention in recent years, mainly due to the evolution of wireless networking and mobile computing hardware. Nevertheless, many inherent vulnerabilities exist in mobile ad hoc networks and their applications that affect the security of wireless transactions. As intrusion prevention mechanisms, such as encryption and authentication, are not sufficient we need a second line of defense, Intrusion Detection. In this pa-per we present an intrusion detection engine based on neural networks and a protection method based on watermarking techniques. In particular, we exploit information visualization and machine learning techniques in order to achieve intrusion detection and we authenticate the maps produced by the application of the intelligent techniques using a novel combined watermarking embedding method. The performance of the proposed model is evaluated under different traffic conditions, mobility patterns and visualization metrics
Recommended from our members
Secure & trusted communication in emergency situations
In this paper we propose SETS, a protocol with main aim to provide secure and private communication during emergency situations. SETS achieves security of the exchanged information, attack resilience and user’s privacy. In addition, SETS can be easily adapted for mobile devices, since field experimental results show the effectiveness of the protocol on actual smart-phone platforms
Theory and computation of electromagnetic transition matrix elements in the continuous spectrum of atoms
The present study examines the mathematical properties of the free-free (
f-f) matrix elements of the full electric field operator, of the multipolar
Hamiltonian. Special methods are developed and applied for their computation,
for the general case where the scattering wavefunctions are calculated
numerically in the potential of the term-dependent (N-1) electron core, and are
energy-normalized. It is found that, on the energy axis, the f-f matrix
elements of the full operator have singularities of first order in the case of
equal photoelectron energies. The numerical applications are for f-f
transitions in Hydrogen and Neon, obeying electric dipole and quadrupole
selection rules. In the limit of zero photon wave-number, the full operator
reduces to the length form of the electric dipole approximation (EDA). It is
found that the results for the EDA agree with those of the full operator, with
the exception of a photon wave-number region about the singularity.Comment: 39 pages, 11 figure
Recommended from our members
Privacy-preserving scheme for mobile ad hoc networks.
This paper proposes a decentralized trust establishment protocol for mobile ad hoc networks (MANETs), where nodes establish security associations. In order to achieve privacy and security, we use homomorphic encryption and polynomial intersection so as to find the intersection of two sets. The first set represents a list of recommenders of the initiator and the second set is a list of trusted recommenders of the responder. The intersection of the sets represents a list of nodes that recommend the first node and their recommendations are trusted by the second node. In our experimental results we show that our scheme is effective even if there are 30 trusted nodes
- …