Exploiting stack-based buffer overflow using modern day techniques
One of the most commonly known vulnerabilities that can affect a binary executable is the stack-based buffer overflow. The buffer overflow occurs when a program, while writing data to a buffer, overruns the buffer’s boundary and overwrites ...
Efficiently Predicting Frequent Patterns over Uncertain Data Streams
In recent decades, frequent pattern mining has become popular in real time computing because it helps users extract meaningful business or technical trends over uncertain data streams. Generally, mainstream frequent pattern mining approaches can ...
Validation of SDN policies: a property-based testing perspective
Software-defined networks are being widely adopted and used in large and complex networks supporting critical operations. Their increasing importance highlights the need for effective validation of SDN topologies and routing policies both prior ...
Ateb-Gabor Filtering Method in Fingerprint Recognition
A new filtration method of Ateb-Gabor for biometric security systems has been developed. It is substantiated that the developed method possesses all the properties of the classic Gabor filter. This greatly extends the functionality of the Gabor ...
The Nonparametric Method for Differentiation of Phonostatistical Structures of Authorial Style
For differentiation of phonostatistical structures of authorial styles, a mеthоd of cоmplex anаlysis of differentiation of phonostatistical structures of authorial style has been developed. The method is based on a combination of the three ...
Unmanned Aerial Vehicle in the Machine Learning Environment
Unmanned Aerial Vehicles and machine learning have started gaining attentions of academic and industrial research. The Unmanned Aerial Vehicles have extended the freedom to operate and monitor the activities from remote locations. This study ...
Quantum Computers for Optimization the Performance
Computers decrease human work and concentrate on enhancing the performance to advance the technology. Various methods have been developed to enhance the performance of computers. Performance of computer is based on computer architecture, while ...
User-oriented cache deletion algorithm in a delayed update-tolerant web cache server for supporting a non-formal education
In developing countries, it is often difficult to use web content for e-learning because Internet accessing is unavailable or limited. To support education in such a situation, the authors previously proposed a system that uses a delayed update-...
JavaNeighbors: Improving ChuckyJava’s neighborhood discovery algorithm
In this paper, a study to protect Java Card source codes against fuzzing attacks is presented. This work is based on the tool ChuckyJava. This tool aims at automatically detecting anomalies in Java source codes in a Machine Learning way, without ...
Optimal placement of Charging Stations for Electric Vehicles in large-scale Transportation Networks
This paper presents a new practical approach to optimally allocate charging stations in large-scale transportation networks for electric vehicles (EVs). The problem is of particular importance to meet the charging demand of the growing fleet of ...
Comparative Study of Ontologies Based ISO 27000 Series Security Standards
Security management standards as ISO/IEC 27000 series provide guidelines, which enable to evaluate the security in the company on a continuous basis. Security ontology technology is the most recommended to make links between security concepts and ...
Unique Message Authentication Security Approach based Controller Area Network (CAN) for Anti-lock Braking System (ABS) in Vehicle Network
Controller Area Network (CAN) is one of the standard communication bus protocols used for intercommunication between electronics control units (ECUs) in vehicle network. However, due to its various security vulnerabilities, safety critical system ...
An Enhancement of Greedy Perimeter Stateless Routing Protocol in VANET
The technological development in the world has increased rapidly and touched various areas, especially communication technology, which evolves with the evolution of wireless technology. This technology has invaded several areas, including the ...
Determinants of Pro-Environmental Activity-Travel Behavior Using GPS-Based Application and SEM Approach
Technological advancement in automobile and infrastructure sector encourages more and longer distance travel and the way people travel to perform their daily tasks creates environmental problems. Activity-travel behavior of individual have a ...
Trackify: A Robust System For Preserving Money Transactions
Money exchange is one of the most ordinary days to day activities done by humans in the daily market. This paper presents an approach for money tracking over a Blockchain. This approach consists of three core components: serial localization, ...
Data-driven prediction system for an environmental smartification approach to child fall accident prevention in a daily living space
Ten thousand children are admitted to emergency rooms due to accidents every year in Tokyo. The most frequent accident is a fall accident. Fall accidents may occur when climbing to a high place in a daily living space. Since injury prevention by ...
Smart Home Is Not Smart Enough to Protect You - Protocols, Challenges and Open Issues
The pervasiveness of the Internet of Things (IoT) has led to its usage in many aspects of our daily life. One significant usage of IoT is in its integration with smart home systems. Since the smart home systems consist of components that can be ...
IoT-Based Home and Community Energy Management System in Jordan
Due to the increasing demands on energy, energy savings have witnessed a great research community attention over the last decades. Currently, home electric-energy bill causes a headache for habitants in modern cities. Many home appliances are ...
Characterizing Instructional Leader Interactions in a Social Learning Management System using Social Network Analysis
Online learning environments are designed with specific users and respective roles in mind. However, for social systems that thrive on the interaction between and among users, important features are developed based on relationships that evolve ...
Context-aware Gossip in Ad hoc Vehicular Networks
The purpose of this paper is to quantify and highlight the effects of how contextually guided gossip in ad hoc dynamic vehicular networks during emergency situations perform. Two traffic scenarios are simulated, each one of the scenarios was ...
NSGA-II based Joint Topology and Routing Optimization of Mesh Networks with Flying Access Points
In this paper, we make use of MOEA to optimize the deployment of Unmanned Aerial Vehicles (UAVs) as access points in a target area taking into account two objectives: (1) minimize the number of UAVs, and (2) maximize the throughput at the ...
A Comparative Study of Predictive Approaches for Load Forecasting in Smart Buildings
Predicting electricity consumption represents one of most important information for efficient energy management in smart buildings. It is mainly used for occupancy prediction and the development of optimized control approaches of building’s ...
A Conceptual Model for a Metric Based Framework for the Monitoring of Information Security Tasks’ Efficiency
Information Security Governance Systems are not adequate to measure the effectiveness and efficiency of security tasks for the enterprises. Although some of the systems offer ways for measurement, they still need the definition of measurement ...
Smart Contracts and Internet of Things: A Qualitative Content Analysis using the Technology-Organization-Environment Framework to Identify Key-Determinants
The spread and success of Internet of Things (IoT) is based on the rapidly growing number of applications, and smart contracts may play a pivotal role in IoT. In this paper, we (i) identify the key-determinants of smart contracts in IoT, and (ii) ...