Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim’s IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks. A comprehensive study on the basics of network security Provides a wide revision on client puzzle theory An experimental model to mitigate distributed denial of service (DDoS) attacks
Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats. Discover novel research into the uses of machine-learning principles and algorithms to detect and prevent phishing attacks Help your business or organization avoid costly damage from phishing sources Gain insight into machine-learning strategies for facing a variety of information security threats
In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required security. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Almost every organization in today's world relies on wireless networks to transmit information, and much of that information should be kept secure. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations. Security experts of today and tomorrow will learn a lot from Optimizing IEE 802.11i Resources and Security Essentials, and it can be used for master level in computer science, information security, wireless network security and cryptography. The research in this book covers how to best balance security concerns with limited resources available on wireless devices as well as how to optimize security resources on higher-end non-mobile devices
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead. Elaborates on the basics of wireless networks, MANETs Explains the significance behind the need of wireless networks and MANET security Understand MANET routing protocols, namely the ADOV method
Micro-ring resonators (MRRs) are employed to generate signals used for optical communication applications, where they can be integrated in a single system. These structures are ideal candidates for very large-scale integrated (VLSI) photonic circuits, since they provide a wide range of optical signal processing functions while being ultra-compact. Soliton pulses have sufficient stability for preservation of their shape and velocity. Technological progress in fields such as tunable narrow band laser systems, multiple transmission, and MRR systems constitute a base for the development of new transmission techniques. Controlling the speed of a light signal has many potential applications in fiber optic communication and quantum computing. The slow light effect has many important applications and is a key technology for all optical networks such as optical signal processing. Generation of slow light in MRRs is based on the nonlinear optical fibers. Slow light can be generated within the micro-ring devices, which will be able to be used with the mobile telephone. Therefore, the message can be kept encrypted via quantum cryptography. Thus perfect security in a mobile telephone network is plausible. This research study involves both numerical experiments and theoretical work based on MRRs for secured communication.
This brief analyzes the characteristics of a microring resonator (MRR) to perform communication using ultra-short soliton pulses. The raising of nonlinear refractive indices, coupling coefficients and radius of the single microring resonator leads to decrease in input power and round trips wherein the bifurcation occurs. As a result, bifurcation or chaos behaviors are seen at lower input power of 44 W, where the nonlinear refractive index is n2=3.2×10−20 m2/W. Using a decimal convertor system, these ultra-short signals can be converted into quantum information. Results show that multi solitons with FWHM and FSR of 10 pm and 600 pm can be generated respectively. The multi optical soliton with FWHM and FSR of 325 pm and 880 nm can be incorporated with a time division multiple access (TDMA) system wherein the transportation of quantum information is performed.
This book demonstrates the implementation of an automated measuring system for very efficient measurement of chromatic dispersion, which uses a modulation phase shift method over long haul of optical single mode fiber. The authors show how a new scheme for measuring chromatic dispersion is adopted in conjunction with a tunable laser (TLS), providing the optical power at required wavelength and digital oscilloscope (DOSC) for measuring the phase difference between microwave signals from transmitter and microwave signals at the receiver. This is a novel approach for real-time chromatic dispersion in optical systems such as optical fibers. The setup used is very simple, accurate and cost effective, compared to other methods such as direct measurement, differential mode delay, polarization mode dispersion measurement and phase delay method.
The title explain new technique of secured and high capacity optical communication signals generation by using the micro and nano ring resonators. The pulses are known as soliton pulses which are more secured due to having the properties of chaotic and dark soliton signals with ultra short bandwidth. They have high capacity due to the fact that ring resonators are able to generate pulses in the form of solitons in multiples and train form. These pulses generated by ring resonators are suitable in optical communication due to use the compact and integrated rings system, easy to control, flexibility, less loss, application in long distance communication and many other advantages. Using these pulses overcome the problems such as losses during the propagation, long distances, error detection, using many repeaters or amplifiers, undetectable received signals, pulse broadening, overlapping and so on. This book show how to generate soliton pulses using ring resonators in the micro and nano range which can be used in optical communication to improve the transmission technique and quality of received signals in networks such as WiFi and wireless communication.
This book provides detailed and accurate information on the history, structure, operation, benefits and advanced structures of silicon MESFET, along with modeling and analysis of the device. The authors explain the detailed physics that are important in modeling of SOI-MESFETs, and present the derivations of compact model expressions so that users can recognize the physical meaning of the model equations and parameters. The discussion also includes advanced structures for SOI-MESFET for submicron applications.
A novel system of dark soliton array (DSA) for secured communication generated by using the multiplexed dark soliton pulses is proposed. The multi soliton pulses with relevant parameters are input into the micro ring resonators system with the radii of 10 µm and 5 µm, where the dynamic dark solitons can be controlled and generated. The DSA are obtained by using a series micro ring resonators with parameters where in the wavelength range of 1.56, 1.58 and1.60. For security applications, the DSA can be tuned and amplified. Thus, the use of DSA for high capacity which can be realized by using proposed secured system. In transmission, the long distance link of the multi variable network can be performed by this DSA.
This book provides detailed and accurate information on the history, structure, operation, benefits and advanced structures of silicon MESFET, along with modeling and analysis of the device. The authors explain the detailed physics that are important in modeling of SOI-MESFETs, and present the derivations of compact model expressions so that users can recognize the physical meaning of the model equations and parameters. The discussion also includes advanced structures for SOI-MESFET for submicron applications.
This book investigates the effect of sintering temperature on willemite based glass-ceramic doped with different content of Er2O3. It is the first to report research on producing willemite by using waste materials and using trivalent erbium (Er3+) as a dopant. This book provides a survey of the literature on glass and glass-ceramic, while comprehensive experiments and analysis have been performed on the material used.
Nonlinear behavior of light such as chaos can be observed during propagation of a laser beam inside the microring resonator (MRR) systems. This Brief highlights the design of a system of MRRs to generate a series of logic codes. An optical soliton is used to generate an entangled photon. The ultra-short soliton pulses provide the required communication signals to generate a pair of polarization entangled photons required for quantum keys. In the frequency domain, MRRs can be used to generate optical millimetre-wave solitons with a broadband frequency of 0–100 GHz. The soliton signals are multiplexed and modulated with the logic codes to transmit the data via a network system. The soliton carriers play critical roles to transmit the data via an optical communication link and provide many applications in secured optical communications. Therefore, transmission of data information can be performed via a communication network using soliton pulse carriers. A system known as optical multiplexer can be used to increase the channel capacity and security of the signals.
This book discusses analytical approaches and modeling of the breakdown voltage (BV) effects on graphene-based transistors. It presents semi-analytical models for lateral electric field, length of velocity saturation region (LVSR), ionization coefficient (α), and breakdown voltage (BV) of single and double-gate graphene nanoribbon field effect transistors (GNRFETs). The application of Gauss’s law at drain and source regions is employed in order to derive surface potential and lateral electric field equations. LVSR is then calculated as a solution of surface potential at saturation condition. The ionization coefficient is modelled and calculated by deriving equations for probability of collisions in ballistic and drift modes based on the lucky drift theory of ionization. The threshold energy of ionization is computed using simulation and an empirical equation is derived semi-analytically. Lastly avalanche breakdown condition is employed to calculate the lateral BV. On the basis of this, simple analytical and semi-analytical models are proposed for the LVSR and BV, which could be used in the design and optimization of semiconductor devices and sensors. The proposed equations are used to examine BV at different channel lengths, supply voltages, oxide thickness, GNR widths, and gate voltages. Simulation results show that the operating voltage of FETs could be as low as 0.25 V in order to prevent breakdown. However, after optimization, it can go as high as 1.5 V. This work is useful for researchers working in the area of graphene nanoribbon-based transistors.
This Brief highlights different approaches used to create stable cellulase and its use in different fields. Cellulase is an industrial enzyme with a broad range of significant applications in biofuel production and cellulosic waste management. Cellulase 7a from Trichoderma reesei is the most efficient enzyme in the bio hydrolysis of cellulose. In order to improve its thermal stability, it can be engineered using a variety of approaches, such as hydrophobic interactions, aromatic interactions, hydrogen bonds, ion pairs and disulfide bridge creation.
This book discusses the enhancement of efficiency in currently used solar cells. The authors have characterized different structures of the solar cell system to optimize system parameters, particularly the performance of the Copper-Tin-Sulphide solar cell using Solar Cell Capacitance Simulator (SCAPS). This research can help scientist to overcome the current limitations and build up new designs of the system with higher efficiency and greater functionality. The authors have investigated the corresponding samples from various viewpoints, including structural (crystallinity, composition and surface morphology), optical (UV–vis–near-IR transmittance/reflectance spectra) and electrical resistivity properties. Describes investigations on Cu2SnS3 solar cells and prospective low cost absorber layer of thin film solar cells; Discusses the potential device structure of Copper-Tin-Sulphide based on thin film technologies; Explains solar cell structure optimization to perform a higher conversion efficiency of Copper-Tin-Sulphide.
This brief analyzes the characteristics of a microring resonator (MRR) to perform communication using ultra-short soliton pulses. The raising of nonlinear refractive indices, coupling coefficients and radius of the single microring resonator leads to decrease in input power and round trips wherein the bifurcation occurs. As a result, bifurcation or chaos behaviors are seen at lower input power of 44 W, where the nonlinear refractive index is n2=3.2×10−20 m2/W. Using a decimal convertor system, these ultra-short signals can be converted into quantum information. Results show that multi solitons with FWHM and FSR of 10 pm and 600 pm can be generated respectively. The multi optical soliton with FWHM and FSR of 325 pm and 880 nm can be incorporated with a time division multiple access (TDMA) system wherein the transportation of quantum information is performed.
Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of those attacks. The results of this study can be used for further studies and to establish the need to have a particular way of audio watermarking for each particular group of songs, each with different characteristics. An additional aspect of this study tests and analyzes two parameters of audio host file and watermark on a specific evaluation method (PSNR) for audio watermarking. Describes research using a common audio watermarking method for four different genres of music Provides the results of many test attacks Presents tests and analyzes two parameters of audio host file and watermark on a specific evaluation method (PSNR) for audio watermarking
Micro-ring resonators (MRRs) are employed to generate signals used for optical communication applications, where they can be integrated in a single system. These structures are ideal candidates for very large-scale integrated (VLSI) photonic circuits, since they provide a wide range of optical signal processing functions while being ultra-compact. Soliton pulses have sufficient stability for preservation of their shape and velocity. Technological progress in fields such as tunable narrow band laser systems, multiple transmission, and MRR systems constitute a base for the development of new transmission techniques. Controlling the speed of a light signal has many potential applications in fiber optic communication and quantum computing. The slow light effect has many important applications and is a key technology for all optical networks such as optical signal processing. Generation of slow light in MRRs is based on the nonlinear optical fibers. Slow light can be generated within the micro-ring devices, which will be able to be used with the mobile telephone. Therefore, the message can be kept encrypted via quantum cryptography. Thus perfect security in a mobile telephone network is plausible. This research study involves both numerical experiments and theoretical work based on MRRs for secured communication.
Nanotechnology has become one of the most important fields in science. Nanoparticles exhibit unique chemical, physical and electronic properties that are different from those of bulk materials, due to their small size and better architecture. Nanoparticles can be used to construct novel sensing devices; in particular electrochemical sensors. Electrochemical detection is highly attractive for the monitoring of glucose, cancer cells, cholesterol and infectious diseases. Unique nanocomposite-based films proposed in this book open new doors to the design and fabrication of high-performance electrochemical sensors.
The title explain new technique of secured and high capacity optical communication signals generation by using the micro and nano ring resonators. The pulses are known as soliton pulses which are more secured due to having the properties of chaotic and dark soliton signals with ultra short bandwidth. They have high capacity due to the fact that ring resonators are able to generate pulses in the form of solitons in multiples and train form. These pulses generated by ring resonators are suitable in optical communication due to use the compact and integrated rings system, easy to control, flexibility, less loss, application in long distance communication and many other advantages. Using these pulses overcome the problems such as losses during the propagation, long distances, error detection, using many repeaters or amplifiers, undetectable received signals, pulse broadening, overlapping and so on. This book show how to generate soliton pulses using ring resonators in the micro and nano range which can be used in optical communication to improve the transmission technique and quality of received signals in networks such as WiFi and wireless communication.
This book describes Service-Oriented Architecture (SOA) and the significant factors which affect its adoption, such as governance, strategy, complexity, Return on Investment (ROI), business and IT alignment, culture and communication, costs, and security. The study on which this book is based, involved a quantitative analysis to investigate the influential factors for adopting SOA, paving the way to further research in the field.
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead. Elaborates on the basics of wireless networks, MANETs Explains the significance behind the need of wireless networks and MANET security Understand MANET routing protocols, namely the ADOV method
Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats. Discover novel research into the uses of machine-learning principles and algorithms to detect and prevent phishing attacks Help your business or organization avoid costly damage from phishing sources Gain insight into machine-learning strategies for facing a variety of information security threats
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed Denial of Service (DDoS) is a large scale DoS attack which is distributed in the Internet. Every computer which has access to the Internet can behave as an attacker. Typically bandwidth depletion can be categorized as either a flood or an amplification attack. Flood attacks can be done by generating ICMP packets or UDP packets in which it can utilize stationary or random variable ports. Smurf and Fraggle attacks are used for amplification attacks. DDoS Smurf attacks are an example of an amplification attack where the attacker sends packets to a network amplifier with the return address spoofed to the victim’s IP address. This book presents new research and methodologies along with a proposed algorithm for prevention of DoS attacks that has been written based on cryptographic concepts such as birthday attacks to estimate the rate of attacks generated and passed along the routers. Consequently, attackers would be identified and prohibited from sending spam traffic to the server which can cause DDoS attacks. Due to the prevalence of DoS attacks, there has been a lot of research conducted on how to detect them and prevent them. The authors of this short format title provide their research results on providing an effective solution to DoS attacks, including introduction of the new algorithm that can be implemented in order to deny DoS attacks. A comprehensive study on the basics of network security Provides a wide revision on client puzzle theory An experimental model to mitigate distributed denial of service (DDoS) attacks
This book focuses on the analysis and treatment of osteoporotic bone based on drug administration, tracking fatigue behavior and taking into consideration the mechanical interaction of implants with trabecular bone. Weak trabeculae are one of the most important clinical features that need to be addressed in order to prevent hip joint fractures.
This book demonstrates the implementation of an automated measuring system for very efficient measurement of chromatic dispersion, which uses a modulation phase shift method over long haul of optical single mode fiber. The authors show how a new scheme for measuring chromatic dispersion is adopted in conjunction with a tunable laser (TLS), providing the optical power at required wavelength and digital oscilloscope (DOSC) for measuring the phase difference between microwave signals from transmitter and microwave signals at the receiver. This is a novel approach for real-time chromatic dispersion in optical systems such as optical fibers. The setup used is very simple, accurate and cost effective, compared to other methods such as direct measurement, differential mode delay, polarization mode dispersion measurement and phase delay method.
In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required security. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Almost every organization in today's world relies on wireless networks to transmit information, and much of that information should be kept secure. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations. Security experts of today and tomorrow will learn a lot from Optimizing IEE 802.11i Resources and Security Essentials, and it can be used for master level in computer science, information security, wireless network security and cryptography. The research in this book covers how to best balance security concerns with limited resources available on wireless devices as well as how to optimize security resources on higher-end non-mobile devices
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.