Click the Desired Domain to Read the Research Articles      

Internet of Things     UAV/USV/Vehicular Ad Hoc Network      Mobile Ad Hoc Network     Underwater/Wireless Sensor Network

     Cloud Computing     Machine Learning     Web/Social Network      Wireless Communication     Cryptography/Network Security     

Intrusion Detection System      Big Data     Image Processing     Data Mining      Malware/Applications

Web and Social Network      

Discovery of Multi-Objective Overlapping Communities within Social Networks using a Socially Inspired Metaheuristic Algorithm
Feyza Altunbey Ozbay, Bilal Alatas

Abstract - Frequently studied structural property of networks is community structure which is described as a group of users. User interactions inside the group are more than those outside the group. Communities in networks may be overlapped as users belong to multiple groups at once. This paper proposes a new socially inspired metaheuristic search and optimization algorithm, Parliamentary Optimization Algorithm (POA), to acquire promising solutions to overlapping community detection problems considering multiple objectives. The salient and unique feature of this work is that for the first time POA has been designed as a multi-objective search method for overlapping community detection. There is not any work about multi-objective overlapping community detection problem in the related literature. For this reason, simulation results of the proposed algorithm have not been compared ............................

Published: 2017Read / Download
TabSecure: An Anti-Phishing Solution with Protection against Tabnabbing
Priyanka Joshi, Madhumita Chatterjee

Abstract - With an upsurge in the use of internet, there are various attacks being launched every day. These attacks target the vulnerabilities of various computer resources, such as, the operating system, web browsers, toolbars, etc. along with the susceptibility of the users due to lack of awareness about the possible scams. The existing solutions suffer various drawbacks. The website phishing solutions fail when JavaScript is used in the webpage. The email phishing solution propose use of a special web browser instead of the existing popular ones, in order to secure the user from phishing emails. The tabnabbing solutions follow visual cues which are prone to false negatives. The proposed approach aims to resolve these issues and provides a solution to phishing through websites, email phishing and tabnabbing using web browser monitor and an email phishing detection module that uses Bayesian classifier, but in a way different from the way it was used in a solution proposed earlier..............................

Published: 2016Read / Download
Optimized Firewall with Traffic Awareness
Mimi Cherian, Madhumita Chatterjee

Abstract - Firewall is one of the well known network-based security devices that have been widely used since the initial days of computer network security. Firewall is designed to allow or reject network traffic depending on firewall rules that displays the types of packets should be accepted or rejected in protected network. Currently growth complexity in network is high and it's very common to find firewall policies consisting of many rules. Packet filtering is the one of the major contemporary firewall design techniques. An important design goal is to arrive at the decision at the packet only [1]. Firewall access rule list consists of rules which are sequentially checked. This implies that firewall filtering overhead and costing will be higher when the order of the matching rules is higher. Hence it is vital, to minimize the filtering overhead. It's critical to have necessary ordering of rules in the firewall rule set. Firewall validates all inbound and outbound packets by analyzing data packet and then by comparing packets with many firewall rules, that defines whether to accept.............................

Published: 2016Read / Download
Security and Fraud Issues of E-banking
Emad Abu-Shanab, Salam Matalqa

Abstract - E-banking has a lot of benefits that add value to customer's satisfaction in term of better service quality, and at the same time enable banks to gain a competitive advantage over other competitors. However, more attention towards e-banking security is required and needed against fraudulent behavior because the lack of control over security makes e-banking still un-trusted for many till today. This paper presents security issues related to e-banking along with the characteristics and challenges of e-banking fraud. Different types of attacks, some fraud detection strategies, and some prevention methods used by electronic banks, are also presented in this paper. An expert opinion method was used to rank different model and techniques in security. Results indicated that the most effective model is "Transaction Monitoring" and the worst models based on respondent's opinions are "Virtual Keyboards", "Browser Protection", and "Device Identification". The organization of...............................

Published: 2015Read / Download
Overlapping Community Detection in Social Networks Using Parliamentary Optimization Algorithm
Feyza Altunbey, Bilal Alatas

Abstract - Parallel to growth of the Internet, social networks have become more attractive as a research topic in many different disciplines and many real systems can be denoted as a complex network. Identifying major clusters and community structures allow us to expose organizational principles in complex network such as web graphs and biological networks. It has been shown that communities are usually overlapping. Overlap is one of the characteristics of social networks, in which a person may belong to more than one social group. In recent years, overlapping community detection has attracted a lot of attention in the area of social networks applications. Many methods have been developed to solve overlapping community detection problem, using different tools and techniques. In this paper, one of the most recent social-based metaheuristic algorithm, Parliamentary Optimization Algorithm (POA), has been firstly proposed to discover overlapping communities in social networks.

Published: 2015Read / Download
A Novel Design of Instant Messaging Service Extended from Short Message Service with XMPP
Heng-Te Chu, Lili Hsieh, Wen-Shiung Chen

Abstract - Instant messaging (IM) services have grown dramatically in recent years. In telephone networks, short message service keeps dominating mobile data services. As the rise of nomadic need, to bridge both messaging services is becoming a promising niche. In this paper we propose an infrastructure, based on the XML-based protocol, XMPP, to simplify the interconnections and enable the legacy handsets for instant message service. Although there is another competitive approach, SIMPLE, based on SIP, we will analyze how the XMPP is to outdo SIMPLE................................

Published: 2015Read / Download
A Survey of Various Security Issues in Online Social Networks
M. Milton Joe, B. Ramakrishnan

Abstract - The most emerging communication medium for the last decade of years is Online Social Networks (OSNs). Online Social Network makes the communication quicker and cheaper. Facebook, Twitter, Google Plus, MySpace, Orkut, etc are the various existing online social networks. Among all the online social networks very few could turn the attention of the people towards them. However, all these social networks are available on the publicly accessible communication medium called internet. When these social networks are available in the internet, it will lead to various types of security issues. This paper discusses the various security related issues persists in online social networks.

Published: 2014Read / Download
A Dynamic Approach of Malicious Node Detection for Internet Traffic Analysis
Ravi Shankar P, Santosh Naidu P

Abstract - Optimizing the internet traffic is always an important research issue in the field of network traffic classification, although various approaches available for minimizing the traffic over heads during the network traffic, they are not optimal. In this paper we are proposing an optimized classification approach for internet traffic by analyzing the behavior of the nodes for allowing or dis connection of the incoming node by computing the posterior probabilities of the factors with respect to the node.

Published: 2014Read / Download

Talk to Us

Mobile: +91 9442777224

Email Us

everscience2015@gmail.com
Write to Us

EverScience Publications
Nagercoil,
Kanyakumari District,
Tamil Nadu, India.
    EverScience Publications
    Computer Science Research Articles
    A Single Platform to Read Reserch Articles in the Field of Computer Science