Search results

1 – 10 of 36
Article
Publication date: 20 September 2019

S. Velliangiri

The service denial threats are regularly regarded as tools for effortlessly triggering online-based services offline. Moreover, the present occurrences reveal that these threats…

Abstract

Purpose

The service denial threats are regularly regarded as tools for effortlessly triggering online-based services offline. Moreover, the present occurrences reveal that these threats are being constantly employed for masking other vulnerable threats like disseminating malware, information losses, wire scams and mining bitcoins (Sujithra et al., 2018; Boujnouni and Jedra, 2018). In some cases, service denials have been employed to cyberheist financial firms which sums around $100,000. Documentation from Neustar accounts that is about 70 percent of the financial sector are aware of the threat, and therefore, incidents result in few losses, more than 35 percent of service denial attempts are identified as malware soon after the threat is sent out (Divyavani and Dileep Kumar Reddy, 2018). Intensive packet analysis (IPA) explores the packet headers from Layers 2 to 4 along with the application information layer from Layers 5 to 7 for locating and evading vulnerable network-related threats. The networked systems could be simply contained by low potent service denial operations in case the supplies of the systems are minimized by the safety modules. The paper aims to discuss these issues.

Design/methodology/approach

The initial feature will be resolved using the IPDME by locating the standard precise header delimiters such as carriage return line feed equally locating the header names. For the designed IPDME, the time difficulties in locating the initial position of the header field within a packet with static time expenses of four cycles. For buffering packets, the framework functions at the speed of cables. Soon after locating the header position, the value of the field is mined linearly from the position. Mining all the field values consequentially resolves the forthcoming restrictions which could be increased by estimating various information bytes per cycle and omitting non-required information packets. In this way, the exploration space is minimized from the packet length to the length of the header. Because of the minimized mining time, the buffered packets could be operated at an increasing time.

Findings

Based on the assessments of IPDME against broadly employed SIP application layer function tools it discloses hardware offloading of IPDME it could minimize the loads on the essential system supplies of about 25 percent. The IPDME reveals that the acceleration of 22X– 75X as evaluated against PJSIP parser and SNORT SIP pre-processor. One IPDME portrays an acceleration of 4X–6X during 12 occurrences of SNORT parsers executing on 12 processors. The IPDME accomplishes 3X superior to 200 parallel occurrences of GPU speeded up processors. Additionally, the IPDME has very minimal latencies with 12X–1,010X minimal than GPUs. IPDME accomplishes minimal energy trails of nearly 0.75 W using two engines and for 15 engines it is 3.6 W, which is 22.5X–100X less as evaluated to the graphic-based GPU speeding up.

Originality/value

IPDME assures that the system pools are not fatigued on Layer 7 mining by transmitting straightforwardly based on network intrusions without branching into the operating systems. IPDME averts the latencies because of the memory accesses by sidestepping the operating system which essentially permits the scheme to function at wired speed. Based on the safety perception, IPDME ultimately enhances the performance of the safety systems employing them. The increased bandwidth of the IPDME assures that the IPA’s could function at their utmost bandwidth. The service time for the threat independent traffic is enhanced because of minimization over the comprehensive latencies over the path among the network intrusions and the related applications.

Details

International Journal of Intelligent Unmanned Systems, vol. 7 no. 4
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 1 April 2003

Georgios I. Zekos

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some…

88492

Abstract

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some legal aspects concerning MNEs, cyberspace and e‐commerce as the means of expression of the digital economy. The whole effort of the author is focused on the examination of various aspects of MNEs and their impact upon globalisation and vice versa and how and if we are moving towards a global digital economy.

Details

Managerial Law, vol. 45 no. 1/2
Type: Research Article
ISSN: 0309-0558

Keywords

Article
Publication date: 9 October 2019

Elham Ali Shammar and Ammar Thabit Zahary

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by…

6488

Abstract

Purpose

Internet has changed radically in the way people interact in the virtual world, in their careers or social relationships. IoT technology has added a new vision to this process by enabling connections between smart objects and humans, and also between smart objects themselves, which leads to anything, anytime, anywhere, and any media communications. IoT allows objects to physically see, hear, think, and perform tasks by making them talk to each other, share information and coordinate decisions. To enable the vision of IoT, it utilizes technologies such as ubiquitous computing, context awareness, RFID, WSN, embedded devices, CPS, communication technologies, and internet protocols. IoT is considered to be the future internet, which is significantly different from the Internet we use today. The purpose of this paper is to provide up-to-date literature on trends of IoT research which is driven by the need for convergence of several interdisciplinary technologies and new applications.

Design/methodology/approach

A comprehensive IoT literature review has been performed in this paper as a survey. The survey starts by providing an overview of IoT concepts, visions and evolutions. IoT architectures are also explored. Then, the most important components of IoT are discussed including a thorough discussion of IoT operating systems such as Tiny OS, Contiki OS, FreeRTOS, and RIOT. A review of IoT applications is also presented in this paper and finally, IoT challenges that can be recently encountered by researchers are introduced.

Findings

Studies of IoT literature and projects show the disproportionate importance of technology in IoT projects, which are often driven by technological interventions rather than innovation in the business model. There are a number of serious concerns about the dangers of IoT growth, particularly in the areas of privacy and security; hence, industry and government began addressing these concerns. At the end, what makes IoT exciting is that we do not yet know the exact use cases which would have the ability to significantly influence our lives.

Originality/value

This survey provides a comprehensive literature review on IoT techniques, operating systems and trends.

Details

Library Hi Tech, vol. 38 no. 1
Type: Research Article
ISSN: 0737-8831

Keywords

Article
Publication date: 1 March 1989

Rodney M. Goodman, John Miller, Padhraic Smyth and Hayes Latin

Describes an approach to real‐time expert systems for integratednetwork management. Presents an overview of expert systems technology,proceeding to develop the requirements for a…

Abstract

Describes an approach to real‐time expert systems for integrated network management. Presents an overview of expert systems technology, proceeding to develop the requirements for a real‐time system in network management. Describes a system being developed (1989) by Pacific Bell. Describes NETREX, a prototype real‐time system, aimed at automatically maintaining Pacific Bell′s internal data networks. Concentrates on an application for solving problems with travel tickets in real time.

Details

Office Technology and People, vol. 5 no. 3
Type: Research Article
ISSN: 0167-5710

Keywords

Article
Publication date: 25 November 2013

Wu He

As mobile malware and virus are rapidly increasing in frequency and sophistication, mobile social media has recently become a very popular attack vector. The purpose of this paper…

4186

Abstract

Purpose

As mobile malware and virus are rapidly increasing in frequency and sophistication, mobile social media has recently become a very popular attack vector. The purpose of this paper is to survey the state-of-the-art of security aspect of mobile social media, identify recent trends, and provide recommendations for researchers and practitioners in this fast moving field.

Design/methodology/approach

This paper reviews disparate discussions in literature on security aspect of mobile social media though blog mining and an extensive literature search. Based on the detailed review, the author summarizes some key insights to help enterprises understand security risks associated with mobile social media.

Findings

Risks related to mobile social media are identified based on the results of the review. Best practices and useful tips are offered to help enterprises mitigate risks of mobile social media. This paper also provides insights and guidance for enterprises to mitigate the security risks of mobile social media.

Originality/value

The paper consolidates the fragmented discussion in literature and provides an in-depth review to help researchers understand the latest development of security risks associated with mobile social media.

Details

Information Management & Computer Security, vol. 21 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 April 2024

Zoubeir Lafhaj, Slim Rebai, Olfa Hamdi, Rateb Jabbar, Hamdi Ayech and Pascal Yim

This study aims to introduce and evaluate the COPULA framework, a construction project monitoring solution based on blockchain designed to address the inherent challenges of…

Abstract

Purpose

This study aims to introduce and evaluate the COPULA framework, a construction project monitoring solution based on blockchain designed to address the inherent challenges of construction project monitoring and management. This research aims to enhance efficiency, transparency and trust within the dynamic and collaborative environment of the construction industry by leveraging the decentralized, secure and immutable nature of blockchain technology.

Design/methodology/approach

This paper employs a comprehensive approach encompassing the formulation of the COPULA model, the development of a digital solution using the ethereum blockchain and extensive testing to assess performance in terms of execution cost, time, integrity, immutability and security. A case analysis is conducted to demonstrate the practical application and benefits of blockchain technology in real-world construction project monitoring scenarios.

Findings

The findings reveal that the COPULA framework effectively addresses critical issues such as centralization, privacy and security vulnerabilities in construction project management. It facilitates seamless data exchange among stakeholders, ensuring real-time transparency and the creation of a tamper-proof communication channel. The framework demonstrates the potential to significantly enhance project efficiency and foster trust among all parties involved.

Research limitations/implications

While the study provides promising insights into the application of blockchain technology in construction project monitoring, future research could explore the integration of COPULA with existing project management methodologies to broaden its applicability and impact. Further investigations into the solution’s scalability and adaptation to various construction project types and sizes are also suggested.

Originality/value

This research offers a comprehensive blockchain solution specifically tailored for the construction industry. Unlike prior studies focusing on theoretical aspects, this paper presents a practical, end-to-end solution encompassing model formulation, digital implementation, proof-of-concept testing and validation analysis. The COPULA framework marks a significant advancement in the digital transformation of construction project monitoring, providing a novel approach to overcoming longstanding industry challenges.

Details

Smart and Sustainable Built Environment, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2046-6099

Keywords

Article
Publication date: 9 July 2020

James Wakiru, Liliane Pintelon, Peter Muchiri and Peter Chemweno

The purpose of this paper is to develop a maintenance decision support system (DSS) framework using in-service lubricant data for fault diagnosis. The DSS reveals embedded…

Abstract

Purpose

The purpose of this paper is to develop a maintenance decision support system (DSS) framework using in-service lubricant data for fault diagnosis. The DSS reveals embedded patterns in the data (knowledge discovery) and automatically quantifies the influence of lubricant parameters on the unhealthy state of the machine using alternative classifiers. The classifiers are compared for robustness from which decision-makers select an appropriate classifier given a specific lubricant data set.

Design/methodology/approach

The DSS embeds a framework integrating cluster and principal component analysis, for feature extraction, and eight classifiers among them extreme gradient boosting (XGB), random forest (RF), decision trees (DT) and logistic regression (LR). A qualitative and quantitative criterion is developed in conjunction with practitioners for comparing the classifier models.

Findings

The results show the importance of embedded knowledge, explored via a knowledge discovery approach. Moreover, the efficacy of the embedded knowledge on maintenance DSS is emphasized. Importantly, the proposed framework is demonstrated as plausible for decision support due to its high accuracy and consideration of practitioners needs.

Practical implications

The proposed framework will potentially assist maintenance managers in accurately exploiting lubricant data for maintenance DSS, while offering insights with reduced time and errors.

Originality/value

Advances in lubricant-based intelligent approach for fault diagnosis is seldom utilized in practice, however, may be incorporated in the information management systems offering high predictive accuracy. The classification models' comparison approach, will inevitably assist the industry in selecting amongst divergent models' for DSS.

Details

Journal of Quality in Maintenance Engineering, vol. 27 no. 2
Type: Research Article
ISSN: 1355-2511

Keywords

Article
Publication date: 24 September 2019

Madjid Tavana and Vahid Hajipour

Expert systems are computer-based systems that mimic the logical processes of human experts or organizations to give advice in a specific domain of knowledge. Fuzzy expert systems…

Abstract

Purpose

Expert systems are computer-based systems that mimic the logical processes of human experts or organizations to give advice in a specific domain of knowledge. Fuzzy expert systems use fuzzy logic to handle uncertainties generated by imprecise, incomplete and/or vague information. The purpose of this paper is to present a comprehensive review of the methods and applications in fuzzy expert systems.

Design/methodology/approach

The authors have carefully reviewed 281 journal publications and 149 conference proceedings published over the past 37 years since 1982. The authors grouped the journal publications and conference proceedings separately accordingly to the methods, application domains, tools and inference systems.

Findings

The authors have synthesized the findings and proposed useful suggestions for future research directions. The authors show that the most common use of fuzzy expert systems is in the medical field.

Originality/value

Fuzzy logic can be used to manage uncertainty in expert systems and solve problems that cannot be solved effectively with conventional methods. In this study, the authors present a comprehensive review of the methods and applications in fuzzy expert systems which could be useful for practicing managers developing expert systems under uncertainty.

Details

Benchmarking: An International Journal, vol. 27 no. 1
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 5 June 2009

John R. Goodall, Wayne G. Lutters and Anita Komlodi

The paper seeks to provide a foundational understanding of the socio‐technical system that is computer network intrusion detection, including the nature of the knowledge work…

1600

Abstract

Purpose

The paper seeks to provide a foundational understanding of the socio‐technical system that is computer network intrusion detection, including the nature of the knowledge work, situated expertise, and processes of learning as supported by information technology.

Design/methodology/approach

The authors conducted a field study to explore the work of computer network intrusion detection using multiple data collection methods, including semi‐structured interviews, examination of security tools and resources, analysis of information security mailing list posts, and attendance at several domain‐specific user group meetings.

Findings

The work practice of intrusion detection analysts involves both domain expertise of networking and security and a high degree of situated expertise and problem‐solving activities that are not predefined and evolve with the dynamically changing context of the analyst's environment. This paper highlights the learning process needed to acquire these two types of knowledge, contrasting this work practice with that of computer systems administrators.

Research limitations/implications

The research establishes a baseline for future research into the domain and practice of intrusion detection, and, more broadly, information security.

Practical implications

The results presented here provide a critical examination of current security practices that will be useful to developers of intrusion detection support tools, information security training programs, information security management, and for practitioners themselves.

Originality/value

There has been no research examining the work or expertise development processes specific to the increasingly important information security practice of intrusion detection. The paper provides a foundation for future research into understanding this highly complex, dynamic work.

Details

Information Technology & People, vol. 22 no. 2
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 February 1990

Gordon Wills, Sherril H. Kennedy, John Cheese and Angela Rushton

To achieve a full understanding of the role ofmarketing from plan to profit requires a knowledgeof the basic building blocks. This textbookintroduces the key concepts in the art…

16155

Abstract

To achieve a full understanding of the role of marketing from plan to profit requires a knowledge of the basic building blocks. This textbook introduces the key concepts in the art or science of marketing to practising managers. Understanding your customers and consumers, the 4 Ps (Product, Place, Price and Promotion) provides the basic tools for effective marketing. Deploying your resources and informing your managerial decision making is dealt with in Unit VII introducing marketing intelligence, competition, budgeting and organisational issues. The logical conclusion of this effort is achieving sales and the particular techniques involved are explored in the final section.

Details

Management Decision, vol. 28 no. 2
Type: Research Article
ISSN: 0025-1747

Keywords

1 – 10 of 36