Search results

1 – 10 of over 3000
Article
Publication date: 14 September 2022

Mythili Boopathi, Meena Chavan, Jeneetha Jebanazer J. and Sanjay Nakharu Prasad Kumar

The Denial of Service (DoS) attack is a category of intrusion that devours various services and resources of the organization by the dispersal of unusable traffic, so that…

Abstract

Purpose

The Denial of Service (DoS) attack is a category of intrusion that devours various services and resources of the organization by the dispersal of unusable traffic, so that reliable users are not capable of getting benefit from the services. In general, the DoS attackers preserve their independence by collaborating several victim machines and following authentic network traffic, which makes it more complex to detect the attack. Thus, these issues and demerits faced by existing DoS attack recognition schemes in cloud are specified as a major challenge to inventing a new attack recognition method.

Design/methodology/approach

This paper aims to detect DoS attack detection scheme, termed as sine cosine anti coronavirus optimization (SCACVO)-driven deep maxout network (DMN). The recorded log file is considered in this method for the attack detection process. Significant features are chosen based on Pearson correlation in the feature selection phase. The over sampling scheme is applied in the data augmentation phase, and then the attack detection is done using DMN. The DMN is trained by the SCACVO algorithm, which is formed by combining sine cosine optimization and anti-corona virus optimization techniques.

Findings

The SCACVO-based DMN offers maximum testing accuracy, true positive rate and true negative rate of 0.9412, 0.9541 and 0.9178, respectively.

Originality/value

The DoS attack detection using the proposed model is accurate and improves the effectiveness of the detection.

Details

International Journal of Pervasive Computing and Communications, vol. 19 no. 5
Type: Research Article
ISSN: 1742-7371

Keywords

Book part
Publication date: 23 March 2017

Barbara de Lima Voss, David Bernard Carter and Bruno Meirelles Salotti

We present a critical literature review debating Brazilian research on social and environmental accounting (SEA). The aim of this study is to understand the role of politics in…

Abstract

We present a critical literature review debating Brazilian research on social and environmental accounting (SEA). The aim of this study is to understand the role of politics in the construction of hegemonies in SEA research in Brazil. In particular, we examine the role of hegemony in relation to the co-option of SEA literature and sustainability in the Brazilian context by the logic of development for economic growth in emerging economies. The methodological approach adopts a post-structural perspective that reflects Laclau and Mouffe’s discourse theory. The study employs a hermeneutical, rhetorical approach to understand and classify 352 Brazilian research articles on SEA. We employ Brown and Fraser’s (2006) categorizations of SEA literature to help in our analysis: the business case, the stakeholder–accountability approach, and the critical case. We argue that the business case is prominent in Brazilian studies. Second-stage analysis suggests that the major themes under discussion include measurement, consulting, and descriptive approach. We argue that these themes illustrate the degree of influence of the hegemonic politics relevant to emerging economics, as these themes predominantly concern economic growth and a capitalist context. This paper discusses trends and practices in the Brazilian literature on SEA and argues that the focus means that SEA avoids critical debates of the role of capitalist logics in an emerging economy concerning sustainability. We urge the Brazilian academy to understand the implications of its reifying agenda and engage, counter-hegemonically, in a social and political agenda beyond the hegemonic support of a particular set of capitalist interests.

Details

Advances in Environmental Accounting & Management: Social and Environmental Accounting in Brazil
Type: Book
ISBN: 978-1-78635-376-4

Keywords

Article
Publication date: 1 June 1999

George K. Chacko

Gives an in depth view of the strategies pursued by the world’s leading chief executive officers in an attempt to provide guidance to new chief executives of today. Considers the…

9941

Abstract

Gives an in depth view of the strategies pursued by the world’s leading chief executive officers in an attempt to provide guidance to new chief executives of today. Considers the marketing strategies employed, together with the organizational structures used and looks at the universal concepts that can be applied to any product. Uses anecdotal evidence to formulate a number of theories which can be used to compare your company with the best in the world. Presents initial survival strategies and then looks at ways companies can broaden their boundaries through manipulation and choice. Covers a huge variety of case studies and examples together with a substantial question and answer section.

Details

Asia Pacific Journal of Marketing and Logistics, vol. 11 no. 2/3
Type: Research Article
ISSN: 1355-5855

Keywords

Book part
Publication date: 16 September 2017

Kevin J. Boudreau

Rather than organize as traditional firms, many of today’s companies organize as platforms that sit at the nexus of multiple exchange and production relationships. This chapter…

Abstract

Rather than organize as traditional firms, many of today’s companies organize as platforms that sit at the nexus of multiple exchange and production relationships. This chapter considers a most basic question of organization in platform contexts: the choice of boundaries. Herein, I investigate how classical economic theories of firm boundaries apply to platform-based organization and empirically study how executives made boundary choices in response to changing market and technical challenges in the early mobile computing industry (the predecessor to today’s smartphones). Rather than a strict or unavoidable tradeoff between “openness-versus-control,” most successful platform owners chose their boundaries in a way to simultaneously open-up to outside developers while maintaining coordination across the entire system.

Details

Entrepreneurship, Innovation, and Platforms
Type: Book
ISBN: 978-1-78743-080-8

Keywords

Article
Publication date: 1 March 1992

Walt Crawford

Once in a while, you should take stock of your personal computing environment. What is on your system? How did it get there? What do you actually use? How did you arrive at your…

Abstract

Once in a while, you should take stock of your personal computing environment. What is on your system? How did it get there? What do you actually use? How did you arrive at your hardware configuration, and does it still meet your needs? You may find that you can free up some disk space in the process; at the very least, you'll understand your situation better. The author goes through this exercise both as an example of what it can show and because full disclosure is important for this series of articles. You need to know the background for the advice that appears here. The author discloses his current computing environments, how they got that way, and what that may mean. He also points out the real limits within which he operates as a PC commentator. When you go through the software on your system, you should check to see whether it represents ethical computing. The author offers a few notes on ethical issues related to software. The author also provides notes from PC literature for January‐June 1992.

Details

Library Hi Tech, vol. 10 no. 3
Type: Research Article
ISSN: 0737-8831

Abstract

Details

Information Services for Innovative Organizations
Type: Book
ISBN: 978-0-12465-030-5

Article
Publication date: 10 October 2016

Abdelaziz Amara Korba, Mehdi Nafaa and Salim Ghanemi

Wireless multi-hop ad hoc networks are becoming very attractive and widely deployed in many kinds of communication and networking applications. However, distributed and…

Abstract

Purpose

Wireless multi-hop ad hoc networks are becoming very attractive and widely deployed in many kinds of communication and networking applications. However, distributed and collaborative routing in such networks makes them vulnerable to various security attacks. This paper aims to design and implement a new efficient intrusion detection and prevention framework, called EIDPF, a host-based framework suitable for mobile ad hoc network’s characteristics such as high node’s mobility, resource-constraints and rapid topology change. EIDPF aims to protect an AODV-based network against routing attacks that could target such network.

Design/methodology/approach

This detection and prevention framework is composed of three complementary modules: a specification-based intrusion detection system to detect attacks violating the protocol specification, a load balancer to prevent fast-forwarding attacks such as wormhole and rushing and adaptive response mechanism to isolate malicious node from the network.

Findings

A key advantage of the proposed framework is its capacity to efficiently avoid fast-forwarding attacks and its real-time detection of both known and unknown attacks violating specification. The simulation results show that EIDPF exhibits a high detection rate, low false positive rate and no extra communication overhead compared to other protection mechanisms.

Originality/value

It is a new intrusion detection and prevention framework to protect ad hoc network against routing attacks. A key strength of the proposed framework is its ability to guarantee a real-time detection of known and unknown attacks that violate the protocol specification, and avoiding wormhole and rushing attacks by providing a load balancing route discovery.

Details

Information & Computer Security, vol. 24 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Book part
Publication date: 7 February 2024

Clóvis Reis and Yanet María Reimondo Barrios

This chapter presents a comparative study of the trends and patterns of communication and tourism research in Brazil and the United States over the last 20 years. Through a…

Abstract

This chapter presents a comparative study of the trends and patterns of communication and tourism research in Brazil and the United States over the last 20 years. Through a bibliometric analysis of the CAPES and EBSCO databases, the study identifies the main theoretical and methodological references, classifies the fundamental themes in the area, and describes the role of communication for tourism. The results indicate the predominance in North American scientific literature of research related to the image and the brand of the tourist destinations, as well as the measurement and the evaluation of the communicative strategies. On the other hand, Brazilian research presents a greater diversity of approaches: destination image studies, tourism consumption, tourist narrative analysis, identities, social networks, community-based tourism, sports, and ecological tourism, with an explicit recognition of the dangers of sexual objectification and dehumanization within tourism. The survey showed that the scientific community has a strong interest in this area, signaling a search for knowledge to deepen the conceptual understanding of the subject. Thus, this chapter provides insights regarding the opportunities and directions for the next decades of research in this field of study.

Details

Creating Culture Through Media and Communication
Type: Book
ISBN: 978-1-80071-602-5

Keywords

Book part
Publication date: 22 August 2018

Molly C. Ball

Using archival and primary source evidence, this chapter introduces the first real wage series from 1891 to 1930 for Brazil’s most important immigrant and industrial city, São…

Abstract

Using archival and primary source evidence, this chapter introduces the first real wage series from 1891 to 1930 for Brazil’s most important immigrant and industrial city, São Paulo. This is the first price series, nominal wage series, and real wage series for the city that covers the duration of the Old Republic. While scholars look to Rio de Janeiro evidence to compare Brazil’s cost of living to other southern cone and immigrant-receiving countries, it is preferable to use evidence from the primary destination city. Price deviations between the two cities underscore the need for these series. The results show foodstuff prices increased steadily over the period and more dramatically in the period during and after World War I. Hedonic wage regressions show hourly wages for unskilled, low-skilled, and medium-skilled workers did not increase accordingly. While the decline in real wages tapered off in the 1920s, real wages across skill levels did not recover to prewar levels. This new index suggests the city of São Paulo’s labor market was more integrated with Buenos Aires’s than with Rio de Janeiro’s and that Paulistano real wages did not recover in the 1920s to the extent that they did in other southern cone cities. Given these results, the puzzle as to why migrants continued to flock to the city prove more intriguing. The results also suggest that Vargas-era labor legislation had the potential to greatly improve the lives of the city’s working class, perhaps more so than in other cities.

Details

Research in Economic History
Type: Book
ISBN: 978-1-78756-582-1

Keywords

Article
Publication date: 1 January 1995

R. Sander and J.F.T. Pittman

A tailored graphical user interface (GUI) for finite elementanalysis, fully integrated into Microsoft Windows 3.1, has been developed.The current application is the simulation of…

Abstract

A tailored graphical user interface (GUI) for finite element analysis, fully integrated into Microsoft Windows 3.1, has been developed. The current application is the simulation of flat sheet extrusion of thermoplastics, but many of the features would be common to a wide range of finite element analyses. Microsoft’s C/C++ Professional Development System 7.0, including the Software Development Kit 3.1 (SDK), has been used as the programming tool for the GUI. The interface is based on the Common User Access Advanced Interface Design Guide, which is part of the IBM Systems Application Architecture Library, and The Windows Interface: An Application Design Guide, which is part of the SDK. A memory handling technique is proposed to break the imposed 64 KB data segmentation. Connected finite element calculation routines are written in Fortran and compiled by the Salford FTN77/x86 32‐bit compiler. The protected mode interface of the Fortran compiler allows direct access by the GUI, and allows the computation to run as a 32‐bit background application, without memory limitations, in the multitasking environment. Finite element routines are supported by pre‐ and post‐processors comprising mesh generation, post‐processing for derived results, and graphical displays. A convenient contouring algorithm is proposed to generate contoured plots of nodal quantities in the form of iso‐lines or iso‐fields.

Details

Engineering Computations, vol. 12 no. 1
Type: Research Article
ISSN: 0264-4401

Keywords

1 – 10 of over 3000