For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
Understanding and maintaining your market to maximise revenue generation opp...Miguel Simões
The document discusses understanding user behavior and market opportunities through analyzing user data from different sources. It describes collecting user data from various technologies and social networks, analyzing the data using mining techniques to find patterns and predict behavior, and managing the unified user profile data. The goal is to segment users and tailor services by merging personal, social, and environmental context information while respecting privacy and user control. Predictions of user behavior could then be used to develop new applications and services, promote growth, and maximize revenue opportunities.
The document discusses Next Century's core competencies including mobile computing, GIS and mapping, data presentation and visualization, signal processing, data fusion and aggregation, image processing, and IT infrastructure and support. It then summarizes several projects including WISER, MASTIF, WRAP, an advanced visualization tool, a threat warning system, advanced image recognition R&D, CERTAS, TORA, and Performance DNA Desktop.
A SESERV methodology for tussle analysis in Future Internet technologies - In...ictseserv
This document introduces a methodology for analyzing "tussles" that may occur between stakeholders with differing interests when new internet technologies are introduced. It defines tussles as conflicts that can arise at each stage of a technology's adoption and use. The methodology involves: 1) Identifying stakeholder roles and interests for a given functionality, 2) Identifying potential tussles between stakeholders, and 3) Assessing the impact of each tussle on stakeholders and the risk of spillover effects on other functionalities. The methodology aims to help understand how new technologies may affect stakeholders and to design technologies that allow for varying outcomes while avoiding instability and spillovers.
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
This document proposes a new measure called M-Score to quantify the potential damage if insider data access is misused. M-Score considers factors like the sensitivity of accessed data, anonymity levels, and the insider's role and history. The document reviews related work on insider threat detection and access control. It then outlines a proposed dynamic access control system that calculates M-Scores and regulates insider access based on their individual thresholds to mitigate misuse risks. The system is designed to work in either a binary access mode or subset disclosure mode to control data exposure.
This document contains an index and list of 94 embedded system projects with topics and years. The projects cover areas like accident notification systems, fall detection, wireless surveillance, gesture recognition, wireless sensor networks, smart homes, traffic control, irrigation systems, and more. Most projects were conducted between 2013-2014 and utilize technologies like ARM, Zigbee, RFID, GPS, and Kinect.
The document proposes a new concept called Misuseability Weight to estimate the potential harm from leaked or misused data exposed to insiders. It assigns a score representing the sensitivity level of the exposed data to predict how it could be maliciously exploited. The M-Score measure calculates this weight for tabular data by using a sensitivity function from domain experts. It aims to help organizations assess risks from insider data exposure and take appropriate prevention steps.
Home automation using android phones-Project 2nd phase pptthrishma reddy
This presentation will be useful for the Information science and Computer science students. It contains Use case diagrams, Activity diagrams and data flow diagrams along with details of other sensors.
Understanding and maintaining your market to maximise revenue generation opp...Miguel Simões
The document discusses understanding user behavior and market opportunities through analyzing user data from different sources. It describes collecting user data from various technologies and social networks, analyzing the data using mining techniques to find patterns and predict behavior, and managing the unified user profile data. The goal is to segment users and tailor services by merging personal, social, and environmental context information while respecting privacy and user control. Predictions of user behavior could then be used to develop new applications and services, promote growth, and maximize revenue opportunities.
The document discusses Next Century's core competencies including mobile computing, GIS and mapping, data presentation and visualization, signal processing, data fusion and aggregation, image processing, and IT infrastructure and support. It then summarizes several projects including WISER, MASTIF, WRAP, an advanced visualization tool, a threat warning system, advanced image recognition R&D, CERTAS, TORA, and Performance DNA Desktop.
A SESERV methodology for tussle analysis in Future Internet technologies - In...ictseserv
This document introduces a methodology for analyzing "tussles" that may occur between stakeholders with differing interests when new internet technologies are introduced. It defines tussles as conflicts that can arise at each stage of a technology's adoption and use. The methodology involves: 1) Identifying stakeholder roles and interests for a given functionality, 2) Identifying potential tussles between stakeholders, and 3) Assessing the impact of each tussle on stakeholders and the risk of spillover effects on other functionalities. The methodology aims to help understand how new technologies may affect stakeholders and to design technologies that allow for varying outcomes while avoiding instability and spillovers.
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
This document proposes a new measure called M-Score to quantify the potential damage if insider data access is misused. M-Score considers factors like the sensitivity of accessed data, anonymity levels, and the insider's role and history. The document reviews related work on insider threat detection and access control. It then outlines a proposed dynamic access control system that calculates M-Scores and regulates insider access based on their individual thresholds to mitigate misuse risks. The system is designed to work in either a binary access mode or subset disclosure mode to control data exposure.
This document contains an index and list of 94 embedded system projects with topics and years. The projects cover areas like accident notification systems, fall detection, wireless surveillance, gesture recognition, wireless sensor networks, smart homes, traffic control, irrigation systems, and more. Most projects were conducted between 2013-2014 and utilize technologies like ARM, Zigbee, RFID, GPS, and Kinect.
The document proposes a new concept called Misuseability Weight to estimate the potential harm from leaked or misused data exposed to insiders. It assigns a score representing the sensitivity level of the exposed data to predict how it could be maliciously exploited. The M-Score measure calculates this weight for tabular data by using a sensitivity function from domain experts. It aims to help organizations assess risks from insider data exposure and take appropriate prevention steps.
Home automation using android phones-Project 2nd phase pptthrishma reddy
This presentation will be useful for the Information science and Computer science students. It contains Use case diagrams, Activity diagrams and data flow diagrams along with details of other sensors.
modeling and predicting cyber hacking breaches Venkat Projects
Analyzing cyber incident data sets is an important method for deepening our understanding of the evolution of the threat situation. This is a relatively new research topic, and many studies remain to be done. In this paper, we report a statistical analysis of a breach incident data set corresponding to 12 years (2005–2017) of cyber hacking activities that include malware attacks. We show that, in contrast to the findings reported in the literature, both hacking breach incident inter-arrival times and breach sizes should be modeled by stochastic processes, rather than by distributions because they exhibit autocorrelations. Then, we propose particular stochastic process models to, respectively, fit the inter-arrival times and the breach sizes. We also show that these models can predict the inter-arrival times and the breach sizes. In order to get deeper insights into the evolution of hacking breach incidents, we conduct both qualitative and quantitative trend analyses on the data set. We draw a set of cybersecurity insights, including that the threat of cyber hacks is indeed getting worse in terms of their frequency, but not in terms of the magnitude of their damage.
A Compendium of Various Applications of Machine LearningIRJET Journal
This document provides a review of various applications of machine learning. It begins with an introduction to machine learning and discusses its applications in fields such as energy efficiency, intrusion detection, anomaly detection, quantitative finance, and cancer prediction and prognosis. Specific machine learning algorithms and techniques discussed include decision trees, naive Bayes, k-nearest neighbors, artificial neural networks, support vector machines, and more. The document also provides examples of machine learning applications in each field and references various research papers to support the discussed applications.
Conker provides next-generation predictive analytics tools that are more accurate, efficient, and accessible than existing options. Current tools are expensive, take months to deploy, and rely on analysts to select variables, introducing bias. Conker's self-service tools automate data preparation, behavioral analysis, and predictive modeling using proprietary algorithms. This handles larger data volumes and lower user skill requirements. Conker has validated their techniques in beta testing and aims to disrupt the $2 billion predictive analytics market with cheaper, more powerful solutions.
The document proposes a dynamic trust computation model called "SecuredTrust" for evaluating trust in multi-agent systems. It aims to address issues with existing trust/reputation models, including their inability to properly evaluate trust of agents with unpredictable malicious behavior or provide quick response to behavioral changes. The model also seeks to distribute workload evenly among service-providing agents. The paper analyzes factors for evaluating agent trust, proposes a quantitative trust measurement model, and a novel load-balancing algorithm based on defined factors. Simulation results show the model can effectively handle strategic changes in malicious agents and efficiently distribute workloads compared to other models.
Manoj Kumar Sadhu is seeking a position where he can contribute his skills and abilities to grow an organization. He has strong skills in SQL, Java, C, Linux, and Microsoft technologies. He has a Master's degree in Computer Science from Northwestern Polytechnic University with a GPA of 3.2/4.0 and a Bachelor's degree in Computer Science from VEMU Institute of Technology with a GPA of 6.5/10.0. His academic projects include developing an advertising agency website, a board game called Navy Beach, and a health and fitness website called Fit Now.
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
The document proposes a dynamic trust computation model called "SecuredTrust" for evaluating trust in multi-agent systems. It aims to address issues with existing models, including their inability to properly evaluate trust of agents with unpredictable malicious behavior or provide quick response to behavioral changes. The model also considers workload distribution among service providing agents. The paper first analyzes factors for evaluating agent trust, then proposes a quantitative trust measurement model and load balancing algorithm based on the defined factors. Simulation results show the model can effectively handle strategic changes in malicious agents' behavior while efficiently distributing workload under stable conditions.
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...IRJET Journal
This document compares and analyzes various tools for data mining and big data mining. It discusses traditional open source data mining tools like Orange, R, Weka, Shogun, Rapid Miner and KNIME. Each tool has different capabilities for data preprocessing, machine learning algorithms, visualization, platforms and programming languages. The document aims to help researchers select the most appropriate data mining tool for their needs and research.
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Editor IJCATR
Network Intrusion detection and Countermeasure Election in virtual network systems (NICE) are used to establish a
defense-in-depth intrusion detection framework. For better attack detection, NICE incorporates attack graph analytical procedures into
the intrusion detection processes. We must note that the design of NICE does not intend to improve any of the existing intrusion
detection algorithms; indeed, NICE employs a reconfigurable virtual networking approach to detect and counter the attempts to
compromise VMs, thus preventing zombie VMs. NICE includes two main phases: deploy a lightweight mirroring-based network
intrusion detection agent (NICE-A) on each cloud server to capture and analyze cloud traffic. A NICE-A periodically scans the virtual
system vulnerabilities within a cloud server to establish Scenario Attack Graph (SAGs), and then based on the severity of identified
vulnerability toward the collaborative attack goals, NICE will decide whether or not to put a VM in network inspection state. Once a
VM enters inspection state, Deep Packet Inspection (DPI) is applied, and/or virtual network reconfigurations can be deployed to the
inspecting VM to make the potential attack behaviors prominent.
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNINGIRJET Journal
The document discusses using machine learning algorithms, specifically the Random Forest algorithm, to detect credit card fraud. It begins with an abstract that outlines how machine learning can be used to analyze large amounts of transaction data and detect fraudulent patterns. The document then provides background on the challenges of credit card fraud and how machine learning is being increasingly used to identify fraudulent transactions. It proposes using the Random Forest algorithm for credit card fraud detection as it can effectively handle large datasets, non-linear relationships between features, and provide important feature analysis. The document discusses preprocessing data, feature engineering, handling imbalanced data, training the Random Forest model, and evaluating performance based on metrics like accuracy, precision, recall and F1 score. It finds that Random Forest achieved
Machine Learning Approaches to Predict Customer Churn in Telecommunications I...IRJET Journal
This project aimed to develop machine learning models to predict customer churn in the telecommunications industry. Four algorithms were evaluated - logistic regression, support vector machine, decision tree, and random forest. Logistic regression performed best with an accuracy of 79.25% and AUC score of 84.08%. The models analyzed customer attribute data to identify patterns and predict churn, helping telecom companies understand churn reasons and develop retention strategies. The results provide insights to improve customer experience and reduce costly customer churn.
This document discusses security issues related to moving from single cloud to multi-cloud environments. It first provides background on the increased use of cloud computing and the privacy and security concerns organizations have in using single cloud providers. It then discusses the trend toward multi-cloud/inter-cloud environments to address issues like availability and potential insider threats. The document examines research on security issues in single and multi-cloud environments and outlines the objective to automatically block attackers and securely compute data across clouds.
Prompt-Based Techniques for Addressing the Initial Data Scarcity in Personali...IRJET Journal
The document proposes a new method called Prompt Recognition to address the initial data scarcity problem in recommendation systems. It introduces a benchmark for evaluating recommendation approaches under initial data scarcity conditions. Prompt Recognition uses pre-trained language models to generate recommendations based on user and item profiles represented as natural language prompts, without requiring any past user-item interaction data. It represents the recommendation task as predicting sentiment words like "good" and "bad" based on the user-item context generated from profiles. Experimental results on several datasets show the effectiveness of the Prompt Recognition approach.
Survey on cloud computing security techniqueseSAT Journals
This document summarizes techniques for ensuring security in cloud computing. It discusses different cloud deployment models and types of threats to cloud security. It then analyzes several intrusion detection and prevention system techniques for providing data security in cloud computing, including proof of retrievability models and cryptographic storage services. It compares the advantages and disadvantages of techniques proposed by Juels, Shacham, Bowers, and Kamara regarding their ability to verify data integrity and availability while tolerating security breaches.
future internetArticleERMOCTAVE A Risk Management Fra.docxgilbertkpeters11344
This document introduces a new risk management framework called ERMOCTAVE for assessing risks associated with adopting cloud computing. ERMOCTAVE combines two existing risk management methods - Enterprise Risk Management (ERM) and Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE). It structures the processes of OCTAVE into three phases and maps the components of ERM to each phase to provide a more comprehensive approach. The document then describes ERMOCTAVE in detail and provides a case study example of how it can be applied by a company migrating parts of its system to Microsoft Azure cloud.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
future internetArticleERMOCTAVE A Risk Management FraDustiBuckner14
future internet
Article
ERMOCTAVE: A Risk Management Framework for IT
Systems Which Adopt Cloud Computing
Masky Mackita 1, Soo-Young Shin 2 and Tae-Young Choe 3,*
1 ING Bank, B-1040 Brussels, Belgium; [email protected]
2 Department of IT Convergence Engineering, Kumoh National Institute of Technology, Gumi 39177, Korea;
[email protected]
3 Department of Computer Engineering, Kumoh National Institute of Technology, Gumi 39177, Korea
* Correspondence: [email protected]; Tel.: +82-54-478-7526
Received: 22 June 2019; Accepted: 3 September 2019; Published: 10 September 2019
����������
�������
Abstract: Many companies are adapting cloud computing technology because moving to the cloud
has an array of benefits. During decision-making, having processed for adopting cloud computing,
the importance of risk management is progressively recognized. However, traditional risk management
methods cannot be applied directly to cloud computing when data are transmitted and processed by
external providers. When they are directly applied, risk management processes can fail by ignoring
the distributed nature of cloud computing and leaving numerous risks unidentified. In order to fix
this backdrop, this paper introduces a new risk management method, Enterprise Risk Management
for Operationally Critical Threat, Asset, and Vulnerability Evaluation (ERMOCTAVE), which combines
Enterprise Risk Management and Operationally Critical Threat, Asset, and Vulnerability Evaluation for
mitigating risks that can arise with cloud computing. ERMOCTAVE is composed of two risk management
methods by combining each component with another processes for comprehensive perception of risks.
In order to explain ERMOCTAVE in detail, a case study scenario is presented where an Internet seller
migrates some modules to Microsoft Azure cloud. The functionality comparison with ENISA and
Microsoft cloud risk assessment shows that ERMOCTAVE has additional features, such as key objectives
and strategies, critical assets, and risk measurement criteria.
Keywords: risk management; ERM; OCTAVE; cloud computing; Microsoft Azure
1. Introduction
Cloud computing is a technology that uses virtualized resources to deliver IT services through the
Internet. It can also be defined as a model that allows network access to a pool of computing resources
such as servers, applications, storage, and services, which can be quickly offered by service providers [1].
One of properties of the cloud is its distributed nature [2]. Data in the cloud environments had become
gradually distributed, moving from a centralized model to a distributed model. That distributed nature
causes cloud computing actors to face problems like loss of data control, difficulties to demonstrate
compliance, and additional legal risks as data migration from one legal jurisdiction to another. An example
is Salesforce.com, which suffered a huge outage, locking more than 900,000 subscribers out of important
resources needed for business trans ...
Future internet articleermoctave a risk management fraarnit1
This document introduces a new risk management framework called ERMOCTAVE for assessing risks associated with adopting cloud computing. ERMOCTAVE combines two existing risk management methods - Enterprise Risk Management (ERM) and Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) - to provide a more comprehensive approach. The framework distributes ERM components across the three phases of the OCTAVE method. A case study is presented to demonstrate how ERMOCTAVE can be applied to assess risks when migrating systems to the Microsoft Azure cloud.
Automated Feature Selection and Churn Prediction using Deep Learning ModelsIRJET Journal
This document discusses using deep learning models for churn prediction in the telecommunications industry. It begins with an introduction to churn prediction and feature selection challenges. It then provides an overview of deep learning techniques, including artificial neural networks, convolutional neural networks, and their applications. The document proposes three deep learning architectures for churn prediction and experiments with them on two telecom datasets. The results show deep learning models can achieve performance comparable to traditional models without manual feature engineering.
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
modeling and predicting cyber hacking breaches Venkat Projects
Analyzing cyber incident data sets is an important method for deepening our understanding of the evolution of the threat situation. This is a relatively new research topic, and many studies remain to be done. In this paper, we report a statistical analysis of a breach incident data set corresponding to 12 years (2005–2017) of cyber hacking activities that include malware attacks. We show that, in contrast to the findings reported in the literature, both hacking breach incident inter-arrival times and breach sizes should be modeled by stochastic processes, rather than by distributions because they exhibit autocorrelations. Then, we propose particular stochastic process models to, respectively, fit the inter-arrival times and the breach sizes. We also show that these models can predict the inter-arrival times and the breach sizes. In order to get deeper insights into the evolution of hacking breach incidents, we conduct both qualitative and quantitative trend analyses on the data set. We draw a set of cybersecurity insights, including that the threat of cyber hacks is indeed getting worse in terms of their frequency, but not in terms of the magnitude of their damage.
A Compendium of Various Applications of Machine LearningIRJET Journal
This document provides a review of various applications of machine learning. It begins with an introduction to machine learning and discusses its applications in fields such as energy efficiency, intrusion detection, anomaly detection, quantitative finance, and cancer prediction and prognosis. Specific machine learning algorithms and techniques discussed include decision trees, naive Bayes, k-nearest neighbors, artificial neural networks, support vector machines, and more. The document also provides examples of machine learning applications in each field and references various research papers to support the discussed applications.
Conker provides next-generation predictive analytics tools that are more accurate, efficient, and accessible than existing options. Current tools are expensive, take months to deploy, and rely on analysts to select variables, introducing bias. Conker's self-service tools automate data preparation, behavioral analysis, and predictive modeling using proprietary algorithms. This handles larger data volumes and lower user skill requirements. Conker has validated their techniques in beta testing and aims to disrupt the $2 billion predictive analytics market with cheaper, more powerful solutions.
The document proposes a dynamic trust computation model called "SecuredTrust" for evaluating trust in multi-agent systems. It aims to address issues with existing trust/reputation models, including their inability to properly evaluate trust of agents with unpredictable malicious behavior or provide quick response to behavioral changes. The model also seeks to distribute workload evenly among service-providing agents. The paper analyzes factors for evaluating agent trust, proposes a quantitative trust measurement model, and a novel load-balancing algorithm based on defined factors. Simulation results show the model can effectively handle strategic changes in malicious agents and efficiently distribute workloads compared to other models.
Manoj Kumar Sadhu is seeking a position where he can contribute his skills and abilities to grow an organization. He has strong skills in SQL, Java, C, Linux, and Microsoft technologies. He has a Master's degree in Computer Science from Northwestern Polytechnic University with a GPA of 3.2/4.0 and a Bachelor's degree in Computer Science from VEMU Institute of Technology with a GPA of 6.5/10.0. His academic projects include developing an advertising agency website, a board game called Navy Beach, and a health and fitness website called Fit Now.
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
The document proposes a dynamic trust computation model called "SecuredTrust" for evaluating trust in multi-agent systems. It aims to address issues with existing models, including their inability to properly evaluate trust of agents with unpredictable malicious behavior or provide quick response to behavioral changes. The model also considers workload distribution among service providing agents. The paper first analyzes factors for evaluating agent trust, then proposes a quantitative trust measurement model and load balancing algorithm based on the defined factors. Simulation results show the model can effectively handle strategic changes in malicious agents' behavior while efficiently distributing workload under stable conditions.
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
IRJET- Comparative Analysis of Various Tools for Data Mining and Big Data...IRJET Journal
This document compares and analyzes various tools for data mining and big data mining. It discusses traditional open source data mining tools like Orange, R, Weka, Shogun, Rapid Miner and KNIME. Each tool has different capabilities for data preprocessing, machine learning algorithms, visualization, platforms and programming languages. The document aims to help researchers select the most appropriate data mining tool for their needs and research.
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Editor IJCATR
Network Intrusion detection and Countermeasure Election in virtual network systems (NICE) are used to establish a
defense-in-depth intrusion detection framework. For better attack detection, NICE incorporates attack graph analytical procedures into
the intrusion detection processes. We must note that the design of NICE does not intend to improve any of the existing intrusion
detection algorithms; indeed, NICE employs a reconfigurable virtual networking approach to detect and counter the attempts to
compromise VMs, thus preventing zombie VMs. NICE includes two main phases: deploy a lightweight mirroring-based network
intrusion detection agent (NICE-A) on each cloud server to capture and analyze cloud traffic. A NICE-A periodically scans the virtual
system vulnerabilities within a cloud server to establish Scenario Attack Graph (SAGs), and then based on the severity of identified
vulnerability toward the collaborative attack goals, NICE will decide whether or not to put a VM in network inspection state. Once a
VM enters inspection state, Deep Packet Inspection (DPI) is applied, and/or virtual network reconfigurations can be deployed to the
inspecting VM to make the potential attack behaviors prominent.
CREDIT CARD FRAUD DETECTION USING MACHINE LEARNINGIRJET Journal
The document discusses using machine learning algorithms, specifically the Random Forest algorithm, to detect credit card fraud. It begins with an abstract that outlines how machine learning can be used to analyze large amounts of transaction data and detect fraudulent patterns. The document then provides background on the challenges of credit card fraud and how machine learning is being increasingly used to identify fraudulent transactions. It proposes using the Random Forest algorithm for credit card fraud detection as it can effectively handle large datasets, non-linear relationships between features, and provide important feature analysis. The document discusses preprocessing data, feature engineering, handling imbalanced data, training the Random Forest model, and evaluating performance based on metrics like accuracy, precision, recall and F1 score. It finds that Random Forest achieved
Machine Learning Approaches to Predict Customer Churn in Telecommunications I...IRJET Journal
This project aimed to develop machine learning models to predict customer churn in the telecommunications industry. Four algorithms were evaluated - logistic regression, support vector machine, decision tree, and random forest. Logistic regression performed best with an accuracy of 79.25% and AUC score of 84.08%. The models analyzed customer attribute data to identify patterns and predict churn, helping telecom companies understand churn reasons and develop retention strategies. The results provide insights to improve customer experience and reduce costly customer churn.
This document discusses security issues related to moving from single cloud to multi-cloud environments. It first provides background on the increased use of cloud computing and the privacy and security concerns organizations have in using single cloud providers. It then discusses the trend toward multi-cloud/inter-cloud environments to address issues like availability and potential insider threats. The document examines research on security issues in single and multi-cloud environments and outlines the objective to automatically block attackers and securely compute data across clouds.
Prompt-Based Techniques for Addressing the Initial Data Scarcity in Personali...IRJET Journal
The document proposes a new method called Prompt Recognition to address the initial data scarcity problem in recommendation systems. It introduces a benchmark for evaluating recommendation approaches under initial data scarcity conditions. Prompt Recognition uses pre-trained language models to generate recommendations based on user and item profiles represented as natural language prompts, without requiring any past user-item interaction data. It represents the recommendation task as predicting sentiment words like "good" and "bad" based on the user-item context generated from profiles. Experimental results on several datasets show the effectiveness of the Prompt Recognition approach.
Survey on cloud computing security techniqueseSAT Journals
This document summarizes techniques for ensuring security in cloud computing. It discusses different cloud deployment models and types of threats to cloud security. It then analyzes several intrusion detection and prevention system techniques for providing data security in cloud computing, including proof of retrievability models and cryptographic storage services. It compares the advantages and disadvantages of techniques proposed by Juels, Shacham, Bowers, and Kamara regarding their ability to verify data integrity and availability while tolerating security breaches.
future internetArticleERMOCTAVE A Risk Management Fra.docxgilbertkpeters11344
This document introduces a new risk management framework called ERMOCTAVE for assessing risks associated with adopting cloud computing. ERMOCTAVE combines two existing risk management methods - Enterprise Risk Management (ERM) and Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE). It structures the processes of OCTAVE into three phases and maps the components of ERM to each phase to provide a more comprehensive approach. The document then describes ERMOCTAVE in detail and provides a case study example of how it can be applied by a company migrating parts of its system to Microsoft Azure cloud.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
future internetArticleERMOCTAVE A Risk Management FraDustiBuckner14
future internet
Article
ERMOCTAVE: A Risk Management Framework for IT
Systems Which Adopt Cloud Computing
Masky Mackita 1, Soo-Young Shin 2 and Tae-Young Choe 3,*
1 ING Bank, B-1040 Brussels, Belgium; [email protected]
2 Department of IT Convergence Engineering, Kumoh National Institute of Technology, Gumi 39177, Korea;
[email protected]
3 Department of Computer Engineering, Kumoh National Institute of Technology, Gumi 39177, Korea
* Correspondence: [email protected]; Tel.: +82-54-478-7526
Received: 22 June 2019; Accepted: 3 September 2019; Published: 10 September 2019
����������
�������
Abstract: Many companies are adapting cloud computing technology because moving to the cloud
has an array of benefits. During decision-making, having processed for adopting cloud computing,
the importance of risk management is progressively recognized. However, traditional risk management
methods cannot be applied directly to cloud computing when data are transmitted and processed by
external providers. When they are directly applied, risk management processes can fail by ignoring
the distributed nature of cloud computing and leaving numerous risks unidentified. In order to fix
this backdrop, this paper introduces a new risk management method, Enterprise Risk Management
for Operationally Critical Threat, Asset, and Vulnerability Evaluation (ERMOCTAVE), which combines
Enterprise Risk Management and Operationally Critical Threat, Asset, and Vulnerability Evaluation for
mitigating risks that can arise with cloud computing. ERMOCTAVE is composed of two risk management
methods by combining each component with another processes for comprehensive perception of risks.
In order to explain ERMOCTAVE in detail, a case study scenario is presented where an Internet seller
migrates some modules to Microsoft Azure cloud. The functionality comparison with ENISA and
Microsoft cloud risk assessment shows that ERMOCTAVE has additional features, such as key objectives
and strategies, critical assets, and risk measurement criteria.
Keywords: risk management; ERM; OCTAVE; cloud computing; Microsoft Azure
1. Introduction
Cloud computing is a technology that uses virtualized resources to deliver IT services through the
Internet. It can also be defined as a model that allows network access to a pool of computing resources
such as servers, applications, storage, and services, which can be quickly offered by service providers [1].
One of properties of the cloud is its distributed nature [2]. Data in the cloud environments had become
gradually distributed, moving from a centralized model to a distributed model. That distributed nature
causes cloud computing actors to face problems like loss of data control, difficulties to demonstrate
compliance, and additional legal risks as data migration from one legal jurisdiction to another. An example
is Salesforce.com, which suffered a huge outage, locking more than 900,000 subscribers out of important
resources needed for business trans ...
Future internet articleermoctave a risk management fraarnit1
This document introduces a new risk management framework called ERMOCTAVE for assessing risks associated with adopting cloud computing. ERMOCTAVE combines two existing risk management methods - Enterprise Risk Management (ERM) and Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) - to provide a more comprehensive approach. The framework distributes ERM components across the three phases of the OCTAVE method. A case study is presented to demonstrate how ERMOCTAVE can be applied to assess risks when migrating systems to the Microsoft Azure cloud.
Automated Feature Selection and Churn Prediction using Deep Learning ModelsIRJET Journal
This document discusses using deep learning models for churn prediction in the telecommunications industry. It begins with an introduction to churn prediction and feature selection challenges. It then provides an overview of deep learning techniques, including artificial neural networks, convolutional neural networks, and their applications. The document proposes three deep learning architectures for churn prediction and experiments with them on two telecom datasets. The results show deep learning models can achieve performance comparable to traditional models without manual feature engineering.
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
This document presents a spam zombie detection system called SPOT that monitors outgoing messages from a network. SPOT uses a statistical tool called Sequential Probability Ratio Test to detect compromised machines involved in spamming. When evaluated on a two-month email trace from a large campus network, SPOT identified 132 of 440 internal IP addresses as compromised, with 126 being confirmed and 16 likely compromised. SPOT missed only 7 compromised machines and outperformed detection algorithms based on spam message counts.
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
This document discusses a new mechanism for improving the trustworthiness of a host system and its data by ensuring the correct origin or provenance of critical system information. It defines data provenance integrity as preventing the source of data from being spoofed or tampered with. It then describes a cryptographic provenance verification approach for enforcing this at the kernel level, with two applications - keystroke integrity verification using a Trusted Computing Platform to prevent forged key events, and a lightweight framework for restricting outbound malware traffic to help identify network activities of stealthy malware.
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
This document discusses extending and aggregating attack graph-based security metrics to more accurately assess network security. It proposes a new suite of complimentary metrics to overcome the shortcomings of existing metrics like shortest path, number of paths, and mean path length. Specifically, it suggests an algorithm to combine these metrics to better determine which of two attack graphs corresponds to the most secure network configuration in many cases.
The document discusses a solution called Assured Digital Signing (ADS) that aims to enhance the trustworthiness of digital signatures. ADS takes advantage of trusted computing and virtualization technologies to examine not only a signature's cryptographic validity, but also its system security validity by ensuring the private signing key and signing function are secure, even if the signing application and operating system kernel are compromised. The modular design of ADS makes it application-transparent and hypervisor-independent. The document reports on an implementation of ADS using the Xen hypervisor to demonstrate feasibility.
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
For further details contact:
N.RAJASEKARAN B.E M.S 9841091117,9840103301.
IMPULSE TECHNOLOGIES,
Old No 251, New No 304,
2nd Floor,
Arcot road ,
Vadapalani ,
Chennai-26.
www.impulse.net.in
Email: ieeeprojects@yahoo.com/ imbpulse@gmail.com
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
1. Impulse Technologies
Beacons U to World of technology
044-42133143, 98401 03301,9841091117 ieeeprojects@yahoo.com www.impulse.net.in
M-Score: A Misuseability Weight Measure
Abstract—
Detecting and preventing data leakage and data misuse poses a serious
challenge for organizations, especially when dealing with insiders with legitimate
permissions to access the organization's systems and its critical data. In this paper,
we present a new concept, Misuseability Weight, for estimating the risk emanating
from data exposed to insiders. This concept focuses on assigning a score that
represents the sensitivity level of the data exposed to the user and by that predicts
the ability of the user to maliciously exploit this data. Then, we propose a new
measure, the M-score, which assigns a misuseability weight to tabular data, discuss
some of its properties, and demonstrate its usefulness in several leakage scenarios.
One of the main challenges in applying the M-score measure is in acquiring the
required knowledge from a domain expert. Therefore, we present and evaluate two
approaches toward eliciting misuseability conceptions from the domain expert.
Your Own Ideas or Any project from any company can be Implemented
at Better price (All Projects can be done in Java or DotNet whichever the student wants)
1