Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








247,169 Hits in 4.4 sec

Implementation of Logging for Information Tracking on Network

Akihiko Maeta, Kenichi Takahashi, Takao Kawamura, Kazunori Sugahara
2013 2013 International Conference on IT Convergence and Security (ICITCS)  
As the result, we can trace information on multiple computers. It would be useful for the control of the operations which uses sensitive information.  ...  However, almost studies focus on single computer. Thus, it is insufficient in recent working situations which exchange a lot of information through network.  ...  IMPLEMENTATION We implemented a system for tracing sensitive information on linux kernel 2.6.22 [8] .  ... 
doi:10.1109/icitcs.2013.6717841 dblp:conf/icitcs/MaetaTKS13 fatcat:fd3sbl2wrzaobaiytmpnj2tgvq

Using Long-Range Wireless Sensor Network to Track the Illegal Cutting Log

Giva Andriana Mutiara, Nanna Suryana Herman, Othman Mohd
2020 Applied Sciences  
The wireless sensor network is a suitable network architecture for remotely monitoring or tracking applications in the environment.  ...  Meanwhile, in terms of the tracking performance, a duration of 5–46 s was required to track the new position of the moving cutting log.  ...  ) and thank you to Embedded and Network System Research Group Laboratory of Telkom University, Bandung, Indonesia for supported this research.  ... 
doi:10.3390/app10196992 fatcat:ujxvbpa2yfalve5o6ws4nuxr34

Securing a Small Network by using Raspberry Pi Honeypot

2020 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
As a basic security characteristic of information security, it is our top priority that we defend and safeguard our Internet of Things devices and home network from cyber threats.  ...  Honeypot a development focused on decoction together with raspberry pi makes our small cost effective and quick to implement network defense security.  ...  Logs will be stored in /var/log/dionaea Thirdly, we will implement tshark which is the terminalbased network tracking and evaluation framework used for real-time data traffic monitoring.  ... 
doi:10.35940/ijitee.f4561.059720 fatcat:354cjbal6bfclcdmkkrhipqara

A portable implementation framework for intrusion-resilient database management systems

A. Smirnov, T. Chiueh
2004 International Conference on Dependable Systems and Networks, 2004  
An intrusion-resilient database management system is the one that is capable of restoring its consistency after being compromised by a malicious attack or a human error.  ...  Performance measurements on the fully operational prototypes under the TPC-C benchmark show that the run-time overhead of the intrusion-resilience mechanism is between 6% and 13%.  ...  , Computer Associates Inc., National Institute of Standards and Technologies, Siemens, and Rether Networks Inc.  ... 
doi:10.1109/dsn.2004.1311914 dblp:conf/dsn/SmirnovC04 fatcat:tyefbqywsfauzeeg2datae6tfu

A Multi-Agent Architecture for Tracking User Interactions in Browser-based Games

A.A. Bagherzadeh, S. Rezvankhah, S. Farahi, K. Khalvati, P. Mousavi, A. Dehghan, B. Ghaderi, L. Kashani, H. Moradi
2012 2012 IEEE Fourth International Conference On Digital Game And Intelligent Toy Enhanced Learning  
The tracking agent writes the user interactions with a game on the local file system, and the log-transfer agent sends the results to the server side of the system as soon as an internet connection is  ...  This paper presents a tracking system developed for browser-based games to track user interactions remotely.  ...  ACKNOWLEDGEMENT This project is sponsored by Iran National Foundation of Computer Game. Further, authors like to thank Solaha preschool and Nona daycare who helped us in conducting our experiments.  ... 
doi:10.1109/digitel.2012.27 dblp:conf/digitel/BagherzadehRFKMDGKM12 fatcat:uce7itkokjah7b67ocqk7lilr4

Hiding Location Information from Location-Based Services

Urs Hengartner
2007 2007 International Conference on Mobile Data Management  
With the help of Private Information Retrieval, we avoid that a service provider learns a customer's location by observing which of its location-specific information is being accessed.  ...  In many existing location-based services, a service provider becomes aware of the location of its customers and can, maybe inadvertently, leak this information to unauthorized entities.  ...  ACKNOWLEDGMENTS We thank the anonymous reviewers for their comments. This work is supported by the Natural Sciences and Engineering Research Council of Canada.  ... 
doi:10.1109/mdm.2007.56 dblp:conf/mdm/Hengartner07 fatcat:b5wzsd6m6revng4nsl4xyjp7au

Tracking Network Events with Write Optimized Data Structures: The Design and Implementation of TWIAD: The Write-Optimized IP Address Database [article]

Nolan Donoghue, Bridger Hahn, Helen Xu, Thomas Kroeger, David Zage and Rob Johnson
2015 arXiv   pre-print
Our initial implementation focuses on utilizing lower cost hardware, demonstrating that basic long-term tracking can be done without advanced equipment.  ...  These efficient, out-of-memory data structures can play a critical role in enabling robust, long-term tracking of network events.  ...  ACKNOWLEDGMENTS We thank the engineers at Tokutek for developing and opensourcing their B ε -tree implementation that TWIAD is built on.  ... 
arXiv:1511.09116v1 fatcat:dazzfzc2graarkqzuco7iaze4q

PeerTrack

Yanbo Wu, Quan Z. Sheng, Damith Ranasinghe, Lina Yao
2012 Proceedings of the 15th International Conference on Extending Database Technology - EDBT '12  
This paper describes PeerTrack, a scalable platform for efficiently and effectively tracking and tracing objects in large-scale traceability networks.  ...  This paper presents the motivation, system design, implementation, and a proof-of-concept system of the PeerTrack platform.  ...  The length of the prefixes is determined by the function log 2 S + log 2 log 2 S, where S is the size of the network, represented by the number of nodes within the network.  ... 
doi:10.1145/2247596.2247672 dblp:conf/edbt/WuSRY12 fatcat:lhin4ausivcp5ov7sqheprzkny

Track: Tracerouting in SDN networks with arbitrary network functions

Yuxiang Zhang, Lin Cui, Fung Po Tso, Yuan Zhang
2017 2017 IEEE 6th International Conference on Cloud Networking (CloudNet)  
Track can discover the forwarding path including NFs taken by any packets, without changing the forwarding rules in switches and internal states of NFs. We have implemented Track on RYU controller.  ...  In this paper, we present a novel troubleshooting tool, Track, for SDN-enabled network with arbitrary NFs.  ...  Notice that Track only log down the information of PACKET IN messages with probe tag.  ... 
doi:10.1109/cloudnet.2017.8071526 dblp:conf/cloudnet/ZhangCTZ17 fatcat:6ecainm36faf7iuby635z7vfum

Security and accountability for sharing the data stored in the cloud

Mostafa Abdulghafoor Mohammed, Zeyad Hussein Salih, Nicolae Tapus, Raed Abdul Kareem Hasan
2016 2016 15th RoEduNet Conference: Networking in Education and Research  
based on information accountability to keep track and trial of the authentic handling of the users' data in the cloud.  ...  on demand network services , in relation , the most important feature of the cloud services is that user's data are hosted in remote .  ...  Currently we concentrate on image files as images represents a very common content type for users on social networks and organizations [3] .  ... 
doi:10.1109/roedunet.2016.7753201 fatcat:reu6hos3avhhdcisvb3zkmculm

Research Issues on Windows Event Log

P. K.Sahoo, R. K. Chottray, S. Pattnaiak
2012 International Journal of Computer Applications  
This research work implements the Winsyslog server as the central server to centralize the storage of log data and event reporter for translation of windows event log data from binary format to syslog  ...  In this context, log data are very useful as it is used to track the history of an intruder in day to day work and providing evidence for further investigation.  ...  An audit log is the simplest, yet also one of the most effective forms of tracking temporal information.  ... 
doi:10.5120/5650-8030 fatcat:bci77pcy4fcllnqybmqjpm6mwm

Privacy-Preserving Social Plugins

Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos
2012 USENIX Security Symposium  
We have implemented our design in SafeButton, an add-on for Firefox that fully supports seven out of the nine social plugins currently provided by Facebook, including the Like button, and partially due  ...  of user-identifying information at load time.  ...  Any opinions, findings, conclusions, or recommendations expressed herein are those of the authors, and do not necessarily reflect those of the US Government or the NSF.  ... 
dblp:conf/uss/PortokalidisPKM12 fatcat:zxmkkawrhffdfivvxc6iusc25m

Online Booking On The Net — Problems, Issues and Solutions [chapter]

B. Pröll, W. Retschitzegger, P. Kroiß, R. R. Wagner
1998 Information and Communication Technologies in Tourism 1998  
The principle used for this tracking of data is designed through an operating system called ANDROID technology I.  ...  This is a new application which can track the calls and messages and save them in database for future reference..  ...  IMPLEMENTATION Experimental Setup we are implementing using java and running it on Android 4.0.1, I.e., Ice cream Sandwich version with 1.2GHz of processor and 768MB ram.  ... 
doi:10.1007/978-3-7091-7504-0_27 fatcat:gkrankq4hjht3m45a5d2dk6gau

Internet of Things : Wild Life Conservation and its Challenges

Ratnesh Kumar Choudhary
2020 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
This paper focuses on implementation of animal monitoring and challenges of wild life conservation.  ...  Recent studies into the extent of illegal logging estimate that illegal logging accounts for 50-90 per cent of the volume of all forestry in key producer tropical countries and 15-30 per cent globally  ...  In V section of the paper focuses on technical challenges faced during implementation of wild life tracking & health monitoring system.  ... 
doi:10.32628/cseit206310 fatcat:nq4mnj3aszflhakoybhhosxucm

Path-Synchronous Performance Monitoring in HPC Interconnection Networks with Source-Code Attribution [chapter]

Adarsh Yoga, Milind Chabbi
2017 Lecture Notes in Computer Science  
Evidently, tracking every message and every packet in the network with this level of detailed statistics is a recipe for performance data deluge and will bring the network to a grinding halt in merely  ...  Performance anomalies involving interconnection networks have largely remained a "black box" for developers relying on traditional CPU profilers.  ...  Acknowledgments This work was supported (in part) by the US Department of Energy (DOE) under Cooperative Agreement DE-SC0012199, the Blackcomb 2 Project.  ... 
doi:10.1007/978-3-319-72971-8_11 fatcat:mcqpugtjovepdd5kjx2b5ioo2i
« Previous Showing results 1 — 15 out of 247,169 results