Skip to main content

Showing 1–5 of 5 results for author: R, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2009.02942  [pdf

    cs.CR

    Detection of Colluded Black-hole and Grey-hole attacks in Cloud Computing

    Authors: Divyasree I R, Selvamani K, Riasudheen H

    Abstract: The availability of the high-capacity network, massive storage, hardware virtualization, utility computing, service-oriented architecture leads to high accessibility of cloud computing. The extensive usage of cloud resources causes oodles of security controversies. Black-hole & Gray-hole attacks are the notable cloud network defenseless attacks while they launched easily but difficult to detect. T… ▽ More

    Submitted 7 September, 2020; originally announced September 2020.

  2. arXiv:1907.07270  [pdf, other

    cs.CV

    Style Transfer Applied to Face Liveness Detection with User-Centered Models

    Authors: Israel A. Laurensi R., Luciana T. Menon, Manoel Camillo O. Penna N., Alessandro L. Koerich, Alceu S. Britto Jr

    Abstract: This paper proposes a face anti-spoofing user-centered model (FAS-UCM). The major difficulty, in this case, is obtaining fraudulent images from all users to train the models. To overcome this problem, the proposed method is divided in three main parts: generation of new spoof images, based on style transfer and spoof image representation models; training of a Convolutional Neural Network (CNN) for… ▽ More

    Submitted 16 July, 2019; originally announced July 2019.

  3. arXiv:1710.04154  [pdf

    cs.CY

    Pengaruh Perangkat Server Terhadap Kualitas Pengontrolan Jarak Jauh Melalui Internet

    Authors: Gunawan, Imam Muslim R

    Abstract: Internet greatly assist people in improving their quality of life. Almost all areas of human life can be accessed using the internet. Human aided by the internet that provides all sorts of information that they need. Along with the development of the Internet network infrastructure remotely control began to change using the internet. In this study using notebooks and servers Raspberry Pi to find o… ▽ More

    Submitted 1 October, 2017; originally announced October 2017.

    Comments: in Indonesian

    Journal ref: Jurnal Teknik Informatika Prima ISSN 2088-6101 hal 45 vol 7, No 2, Oktober 2014

  4. arXiv:0908.3587  [pdf

    cs.CR

    Tracing Technique for Blaster Attack

    Authors: Siti Rahayu S., Robiah Y., Shahrin S., Faizal M. A., Mohd Zaki M, Irda R

    Abstract: Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in differen… ▽ More

    Submitted 25 August, 2009; originally announced August 2009.

    Comments: 8 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423 http://sites.google.com/site/ijcsis/

    Report number: ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Volume 4, No. 1, August 2009, USA

  5. arXiv:0907.4881  [pdf

    cs.NI cs.PF

    Approximate mechanism for measuring stability of Internet link in aggregated Internet pipe

    Authors: Vipin M, Mohamed Imran K R

    Abstract: In this article we propose a method for measuring internet connection stability which is fast and has negligible overhead for the process of its complexity. This method finds a relative value for representing the stability of internet connections and can also be extended for aggregated internet connections. The method is documented with help of a real time implementation and results are shared.… ▽ More

    Submitted 28 July, 2009; originally announced July 2009.

    Comments: 8 pages, 5 figures

    ACM Class: C.2.1; C.2.3; C.2.6