A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Implementation of Logging for Information Tracking on Network
2013
2013 International Conference on IT Convergence and Security (ICITCS)
As the result, we can trace information on multiple computers. It would be useful for the control of the operations which uses sensitive information. ...
However, almost studies focus on single computer. Thus, it is insufficient in recent working situations which exchange a lot of information through network. ...
IMPLEMENTATION We implemented a system for tracing sensitive information on linux kernel 2.6.22 [8] . ...
doi:10.1109/icitcs.2013.6717841
dblp:conf/icitcs/MaetaTKS13
fatcat:fd3sbl2wrzaobaiytmpnj2tgvq
Using Long-Range Wireless Sensor Network to Track the Illegal Cutting Log
2020
Applied Sciences
The wireless sensor network is a suitable network architecture for remotely monitoring or tracking applications in the environment. ...
Meanwhile, in terms of the tracking performance, a duration of 5–46 s was required to track the new position of the moving cutting log. ...
) and thank you to Embedded and Network System Research Group Laboratory of Telkom University, Bandung, Indonesia for supported this research. ...
doi:10.3390/app10196992
fatcat:ujxvbpa2yfalve5o6ws4nuxr34
Securing a Small Network by using Raspberry Pi Honeypot
2020
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
As a basic security characteristic of information security, it is our top priority that we defend and safeguard our Internet of Things devices and home network from cyber threats. ...
Honeypot a development focused on decoction together with raspberry pi makes our small cost effective and quick to implement network defense security. ...
Logs will be stored in /var/log/dionaea Thirdly, we will implement tshark which is the terminalbased network tracking and evaluation framework used for real-time data traffic monitoring. ...
doi:10.35940/ijitee.f4561.059720
fatcat:354cjbal6bfclcdmkkrhipqara
A portable implementation framework for intrusion-resilient database management systems
2004
International Conference on Dependable Systems and Networks, 2004
An intrusion-resilient database management system is the one that is capable of restoring its consistency after being compromised by a malicious attack or a human error. ...
Performance measurements on the fully operational prototypes under the TPC-C benchmark show that the run-time overhead of the intrusion-resilience mechanism is between 6% and 13%. ...
, Computer Associates Inc., National Institute of Standards and Technologies, Siemens, and Rether Networks Inc. ...
doi:10.1109/dsn.2004.1311914
dblp:conf/dsn/SmirnovC04
fatcat:tyefbqywsfauzeeg2datae6tfu
A Multi-Agent Architecture for Tracking User Interactions in Browser-based Games
2012
2012 IEEE Fourth International Conference On Digital Game And Intelligent Toy Enhanced Learning
The tracking agent writes the user interactions with a game on the local file system, and the log-transfer agent sends the results to the server side of the system as soon as an internet connection is ...
This paper presents a tracking system developed for browser-based games to track user interactions remotely. ...
ACKNOWLEDGEMENT This project is sponsored by Iran National Foundation of Computer Game. Further, authors like to thank Solaha preschool and Nona daycare who helped us in conducting our experiments. ...
doi:10.1109/digitel.2012.27
dblp:conf/digitel/BagherzadehRFKMDGKM12
fatcat:uce7itkokjah7b67ocqk7lilr4
Hiding Location Information from Location-Based Services
2007
2007 International Conference on Mobile Data Management
With the help of Private Information Retrieval, we avoid that a service provider learns a customer's location by observing which of its location-specific information is being accessed. ...
In many existing location-based services, a service provider becomes aware of the location of its customers and can, maybe inadvertently, leak this information to unauthorized entities. ...
ACKNOWLEDGMENTS We thank the anonymous reviewers for their comments. This work is supported by the Natural Sciences and Engineering Research Council of Canada. ...
doi:10.1109/mdm.2007.56
dblp:conf/mdm/Hengartner07
fatcat:b5wzsd6m6revng4nsl4xyjp7au
Tracking Network Events with Write Optimized Data Structures: The Design and Implementation of TWIAD: The Write-Optimized IP Address Database
[article]
2015
arXiv
pre-print
Our initial implementation focuses on utilizing lower cost hardware, demonstrating that basic long-term tracking can be done without advanced equipment. ...
These efficient, out-of-memory data structures can play a critical role in enabling robust, long-term tracking of network events. ...
ACKNOWLEDGMENTS We thank the engineers at Tokutek for developing and opensourcing their B ε -tree implementation that TWIAD is built on. ...
arXiv:1511.09116v1
fatcat:dazzfzc2graarkqzuco7iaze4q
PeerTrack
2012
Proceedings of the 15th International Conference on Extending Database Technology - EDBT '12
This paper describes PeerTrack, a scalable platform for efficiently and effectively tracking and tracing objects in large-scale traceability networks. ...
This paper presents the motivation, system design, implementation, and a proof-of-concept system of the PeerTrack platform. ...
The length of the prefixes is determined by the function log 2 S + log 2 log 2 S, where S is the size of the network, represented by the number of nodes within the network. ...
doi:10.1145/2247596.2247672
dblp:conf/edbt/WuSRY12
fatcat:lhin4ausivcp5ov7sqheprzkny
Track: Tracerouting in SDN networks with arbitrary network functions
2017
2017 IEEE 6th International Conference on Cloud Networking (CloudNet)
Track can discover the forwarding path including NFs taken by any packets, without changing the forwarding rules in switches and internal states of NFs. We have implemented Track on RYU controller. ...
In this paper, we present a novel troubleshooting tool, Track, for SDN-enabled network with arbitrary NFs. ...
Notice that Track only log down the information of PACKET IN messages with probe tag. ...
doi:10.1109/cloudnet.2017.8071526
dblp:conf/cloudnet/ZhangCTZ17
fatcat:6ecainm36faf7iuby635z7vfum
Security and accountability for sharing the data stored in the cloud
2016
2016 15th RoEduNet Conference: Networking in Education and Research
based on information accountability to keep track and trial of the authentic handling of the users' data in the cloud. ...
on demand network services , in relation , the most important feature of the cloud services is that user's data are hosted in remote . ...
Currently we concentrate on image files as images represents a very common content type for users on social networks and organizations [3] . ...
doi:10.1109/roedunet.2016.7753201
fatcat:reu6hos3avhhdcisvb3zkmculm
Research Issues on Windows Event Log
2012
International Journal of Computer Applications
This research work implements the Winsyslog server as the central server to centralize the storage of log data and event reporter for translation of windows event log data from binary format to syslog ...
In this context, log data are very useful as it is used to track the history of an intruder in day to day work and providing evidence for further investigation. ...
An audit log is the simplest, yet also one of the most effective forms of tracking temporal information. ...
doi:10.5120/5650-8030
fatcat:bci77pcy4fcllnqybmqjpm6mwm
Privacy-Preserving Social Plugins
2012
USENIX Security Symposium
We have implemented our design in SafeButton, an add-on for Firefox that fully supports seven out of the nine social plugins currently provided by Facebook, including the Like button, and partially due ...
of user-identifying information at load time. ...
Any opinions, findings, conclusions, or recommendations expressed herein are those of the authors, and do not necessarily reflect those of the US Government or the NSF. ...
dblp:conf/uss/PortokalidisPKM12
fatcat:zxmkkawrhffdfivvxc6iusc25m
Online Booking On The Net — Problems, Issues and Solutions
[chapter]
1998
Information and Communication Technologies in Tourism 1998
The principle used for this tracking of data is designed through an operating system called ANDROID technology I. ...
This is a new application which can track the calls and messages and save them in database for future reference.. ...
IMPLEMENTATION Experimental Setup we are implementing using java and running it on Android 4.0.1, I.e., Ice cream Sandwich version with 1.2GHz of processor and 768MB ram. ...
doi:10.1007/978-3-7091-7504-0_27
fatcat:gkrankq4hjht3m45a5d2dk6gau
Internet of Things : Wild Life Conservation and its Challenges
2020
International Journal of Scientific Research in Computer Science Engineering and Information Technology
This paper focuses on implementation of animal monitoring and challenges of wild life conservation. ...
Recent studies into the extent of illegal logging estimate that illegal logging accounts for 50-90 per cent of the volume of all forestry in key producer tropical countries and 15-30 per cent globally ...
In V section of the paper focuses
on technical challenges faced during implementation
of wild life tracking & health monitoring system. ...
doi:10.32628/cseit206310
fatcat:nq4mnj3aszflhakoybhhosxucm
Path-Synchronous Performance Monitoring in HPC Interconnection Networks with Source-Code Attribution
[chapter]
2017
Lecture Notes in Computer Science
Evidently, tracking every message and every packet in the network with this level of detailed statistics is a recipe for performance data deluge and will bring the network to a grinding halt in merely ...
Performance anomalies involving interconnection networks have largely remained a "black box" for developers relying on traditional CPU profilers. ...
Acknowledgments This work was supported (in part) by the US Department of Energy (DOE) under Cooperative Agreement DE-SC0012199, the Blackcomb 2 Project. ...
doi:10.1007/978-3-319-72971-8_11
fatcat:mcqpugtjovepdd5kjx2b5ioo2i
« Previous
Showing results 1 — 15 out of 247,169 results