Browsing Computing Journal Articles by Title
Now showing items 44-50 of 50
-
A Self-Organization Mechanism Based on Cross-Entropy Method for P2P-Like Applications
(2010)P2P-like applications are quickly gaining popularity in the Internet. Such applications are commonly modeled as graphs with nodes and edges. Usually nodes represent running processes that exchange information with each ... -
Service provision control in federated service providing systems
(2013-03)Different from traditional P2P systems, individuals nodes of a Federated Service Providing (FSP) system play a more active role by offering a variety of domain-specific services. The service provision control (SPC) problem ... -
Social engineering attacks and countermeasures in the New Zealand banking system : advancing a user-reflective mitigation model
(MDPI (Multidisciplinary Digital Publishing Institute), 2018-05-03)Social engineering attacks are possibly one of the most dangerous forms of security and privacy attacks since they are technically oriented to psychological manipulation and have been growing in frequency with no end in ... -
Technical review : performance of existing imputation methods for missing data in SVM ensemble creation
(AIRCC Publishing Corporation, 2017)Incomplete data is present in many study contents. This incomplete or uncollected data information is named as missing data (values), and considered as vital problem for various researchers. Even this missing data problem ... -
A trust-aware RPL routing protocol to detect blackhole and selective forwarding attacks
(RMIT University, Melbourne, Victoria, Australia, 2017-03-26)This research addresses blackhole and selective forwarding routing attacks, whichare fundamental security attacks on the routing of data in IoT networks. Most IoT devices today,from medical devices to connected vehicles ... -
A trust-based defence scheme for mitigating blackhole and selective forwarding attacks in the RPL routing protocol
(TelSoc : Telecommunications and the Digital Economy, 2018-03-30)The routing protocol for low-power and lossy networks (RPL) has gained prominence as the standard IoT routing protocol. However, it faces like many other routing protocols diverse attacks. Many studies have been proposed ... -
A View Framework for Modeling and Change Validation of Artifact-Centric Inter-Organizational Business Processes
(Elsevier, 2015)Over the past several years, more efficient approaches have been on increasing demands for designing, modeling, and implementing inter-organizational business processes. In the process collaboration across organizational ...