Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Physical Sciences and Mathematics

Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj Feb 2019

Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj

International Journal of Business and Technology

With the rapid increase demand for data usage, Internet has become complex and harder to analyze. Characterizing the Internet traffic might reveal information that are important for Network Operators to formulate policy decisions, develop techniques to detect network anomalies, help better provision network resources (capacity, buffers) and use workload characteristics for simulations (typical packet sizes, flow durations, common protocols).

In this paper, using passive monitoring and measurements, we show collected data traffic at Internet backbone routers. First, we reveal main observations on patterns and characteristics of this dataset including packet sizes, traffic volume for inter and intra domain and protocol …


The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy Nov 2015

The Role Of Cryptography In Security For Electronic Commerce, Ann Murphy, David Murphy

The ITB Journal

Many businesses and consumers are wary of conducting business over the Internet due to a perceived lack of security. Electronic business is subject to a variety of threats such as unauthorised access, misappropriation, alteration and destruction of both data and systems. This paper explores the major security concerns of businesses and users and describes the cryptographic techniques used to reduce such risks.


Towards A “Cloud Curriculum” In Art And Science?, Roger Malina Mar 2013

Towards A “Cloud Curriculum” In Art And Science?, Roger Malina

The STEAM Journal

Recently an email hit my desk from Paul Thomas in Australia with a proposal to work together on a “Cloud Curriculum for Art and Science”. I immediately agreed to collaborate. I don’t yet have a clue of what a cloud curriculum is, but what I do know is that we are ‘backing into the future’ in educational institutions and we desperately need a ‘cloud curriculum.’ We need to look over the ten year horizon. And in the emerging art-science field I doubt that the usual approach to curriculum development will work.


Discrete Event Simulation-Based Performance Evaluation Of Internet Routing Protocols, Fati̇h Çeli̇k, Ahmet Zengi̇n, Bülent Çobanoğlu Jan 2013

Discrete Event Simulation-Based Performance Evaluation Of Internet Routing Protocols, Fati̇h Çeli̇k, Ahmet Zengi̇n, Bülent Çobanoğlu

Turkish Journal of Electrical Engineering and Computer Sciences

This paper presents a discrete event system specification (DEVS)-based comparative performance analysis between the open shortest path first (OSPF) protocol and the routing information protocol (RIP), together with the border gateway protocol (BGP), using DEVS-Suite. In order to evaluate the OSPF and RIP's scalability performance, several network models are designed and configured with the OSPF and RIP, in combination with the BGP. Evaluations of the proposed routing protocols are performed based on the metrics, such as the execution time, convergence time, turnaround time, throughput, and efficiency across an increasing size and complexity through the simulated network models. The evaluation results …


Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala Jan 2008

Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala

Journal of Digital Forensics, Security and Law

That “knowledge is power” is fast becoming a cliché within the intelligentsia. Such power however, depends largely on how knowledge itself is exchanged and used, which says a lot about the tools of its transmission, exchange, and storage. Information and communication technology (ICT) plays a significant role in this respect. As a networked tool, it enables efficient exchanges of video, audio and text data beyond geographical and time constraints. Since this data is exchanged over the worldwide web (www), it can be accessible by anyone in the world using the internet. The risk of unauthorised access, interception, modification, or even …


The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney Jan 2007

The Evolution Of Internet Legal Regulation In Addressing Crime And Terrorism, Murdoch Watney

Journal of Digital Forensics, Security and Law

Internet regulation has evolved from self-regulation to the criminalization of conduct to state control of information available, accessed and submitted. Criticism has been leveled at the different forms of state control and the methods employed to enforce state control. After the terrorist attack on the USA on 11 September 2001, governments justify Internet state control as a law enforcement and national security tool against the abuse and misuse of the Internet for the commission of serious crimes, such as phishing, child pornography; terrorism and copyright infringement. Some Internet users and civil rights groups perceive state control as an abomination which …


The Role Of Power And Negotiation In Online Deception, Chad Albrecht, Conan C. Albrecht, Jonathan Wareham, Paul Fox Jan 2006

The Role Of Power And Negotiation In Online Deception, Chad Albrecht, Conan C. Albrecht, Jonathan Wareham, Paul Fox

Journal of Digital Forensics, Security and Law

The purpose of this paper is to advance theoretical understanding of the important role of both power and negotiation during online deception. By so doing, the paper provides insight into the relationship between perpetrator and victim in Internet fraud. The growing prevalence of Internet Fraud continues to be a burden to both society and individuals. In an attempt to better understand Internet fraud and online deception, this article attempts to build an interactive model, based upon the dimensions of power and negotiation from the management and psychology literature. Using the model presented, the article examines the effects of the Internet …