Search results for " networking"
showing 10 items of 1264 documents
Assisted labeling for spam account detection on twitter
2019
Online Social Networks (OSNs) have become increasingly popular both because of their ease of use and their availability through almost any smart device. Unfortunately, these characteristics make OSNs also target of users interested in performing malicious activities, such as spreading malware and performing phishing attacks. In this paper we address the problem of spam detection on Twitter providing a novel method to support the creation of large-scale annotated datasets. More specifically, URL inspection and tweet clustering are performed in order to detect some common behaviors of spammers and legitimate users. Finally, the manual annotation effort is further reduced by grouping similar u…
The role of social networking services in eParticipation
2009
Published version of a chapter published in Lecture Notes in Computer Science, 5694, 46-55. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-03781-8_5 A serious problem in eParticipation projects is citizen engagement – citizens do not necessarily become more willing to participate simply because net-services are provided for them. Most forms of eParticipation in democratic contexts are, however, dependent on citizen engagement, interaction and social networking because democratic systems favour the interests of larger groups of citizens – the more voices behind a political proposition, the greater its chances of success. In this context of challenges the study of s…
UBFC-Phys: A Multimodal Database For Psychophysiological Studies of Social Stress
2021
As humans, we experience social stress in countless everyday-life situations. Giving a speech in front of an audience, passing a job interview, and similar experiences all lead us to go through stress states that impact both our psychological and physiological states. Therefore, studying the link between stress and physiological responses had become a critical societal issue, and recently, research in this field has grown in popularity. However, publicly available datasets have limitations. In this article, we propose a new dataset, UBFC-Phys, collected with and without contact from participants living social stress situations. A wristband was used to measure contact blood volume pulse (BVP…
The Role of Labour and Associated EU Liberalization Challenges: Insights from the Port Sector
2013
An influential argument holds that labour unions are not likely to succeed in their objectives through current European decision-making processes. In addition, the European Union has extensive leverage to introduce negative integration due to asymmetries towards liberalization in the treaties. Given such arguments it is of interest to study a case, where attempts of EU liberalization reform have failed and labour unions claim this is their victory. An in-depth analysis of the decision-making process of the proposal for a Port Directive highlights that labour unions are most influential when they are able to exploit the division of industry interests to resoundingly oppose policy change. Mor…
New novel idea for Cloud Computing: How can we use Kalman filter in security of Cloud Computing
2012
Cloud is a virtual image about some amount of undefined powers, that is widespread and had unknown power and inexact amount of hardware and software configurations, and because of we have not any information about clouds location and time dimensions and also the amounts of its sources we tell that Cloud Computing. This technology presents lots of abilities and opportunities such as processing power, storage and accessing it from everywhere, supporting, working - team group - with the latest versions of software and etc., by the means of internet. On the other hand, in such a large scale networks we should consider the reliability and powerfulness of such networks in facing with events such …
Honeypot Utilization for Network Intrusion Detection
2018
For research purposes, a honeypot is a system that enables observing attacker’s actions in different phases of a cyberattack. In this study, a honeypot called Kippo was used to identify attack behavior in Finland. The gathered data consisted of dictionary attack login attempts, attacker location, and actions after successful login. From the data, attacker behavior was analyzed. Differentiating bots from human actors, linking scanning activity to further attack steps, and identifying malware and tracking malware sites were all done. The knowledge gained could be used to enhance an organization’s cyber resiliency by identifying attacker motivations and the tools used. Automating analysis of h…
On the Consistency of Non-Stationary Multipath Fading Channels with Respect to the Average Doppler Shift and the Doppler Spread
2017
This paper is concerned with the consistency of non-stationary multipath fading channels. We introduce conditions under which a channel model is consistent w.r.t. the average Doppler shift and the Doppler spread. The conditions are applied to two classes of non-stationary channel models. The first class, which is termed Class A, is characterized by channel models based on an integral relationship between the path phases and the associated time-variant Doppler frequencies. The second class of models, called the Class B models, emerges from standard sum-of-cisoids (SOC) models by replacing the time-independent Doppler frequencies by time-dependent Doppler frequencies. It is shown that the Cla…
5G IoT System for Real-Time Psycho-Acoustic Soundscape Monitoring in Smart Cities With Dynamic Computational Offloading to the Edge
2021
Environmental noise monitoring for smart cities need to be as much efficient as possible in order to mitigate its significant impact in the health of their inhabitants. 5G Internet of Things (IoT) systems offer a big opportunity to offload the computation from the sensor nodes, since it provides a series of new concepts for dynamic computing that the previous technologies did not offer. In this article, a complete 5G IoT system for psycho-acoustic monitoring has been designed and implemented using different options for offloading computation to different parts of the system. This offloading has been done by developing different functional splittings of the psycho-acoustic metrics algorithms…
Spatio-Temporal Analysis of Urban Acoustic Environments with Binaural Psycho-Acoustical Considerations for IoT-Based Applications
2018
Sound pleasantness or annoyance perceived in urban soundscapes is a major concern in environmental acoustics. Binaural psychoacoustic parameters are helpful to describe generic acoustic environments, as it is stated within the ISO 12913 framework. In this paper, the application of a Wireless Acoustic Sensor Network (WASN) to evaluate the spatial distribution and the evolution of urban acoustic environments is described. Two experiments are presented using an indoor and an outdoor deployment of a WASN with several nodes using an Internet of Things (IoT) environment to collect audio data and calculate meaningful parameters such as the sound pressure level, binaural loudness and binaural sharp…
Routing Algorithm for Maximizing Lifetime of Wireless Sensor Network for Broadcast Transmission
2018
In the article we discuss solutions of the maximum lifetime broadcasting problem in wireless sensor networks. Due to limited energy resources of the network nodes to find an optimal transmission route of the broadcasted data we minimize the maximum energy consumed by the nodes. We give an analytical solution of the problem in one dimensional regular sensor network for the point-to-point and point-to-multipoint data transmission scheme. We show that in such a network, when the cost of data transmission is a polynomial function of distance between transmitter and receiver, there exist solutions with an equal energy, i.e., all nodes of the network consume the same amount of energy. We assume t…