Repository of University of Nova Gorica

Search the repository
A+ | A- | Help | SLO | ENG

Query: search in
search in
search in
search in
* old and bolonia study programme

Options:
  Reset


1 - 10 / 10
First pagePrevious page1Next pageLast page
1.
2.
A spatio-temporal database for positioning systems: the case of CellLocate
Marco Tosolini, 2014, master's thesis

Found in: ključnih besedah
Keywords: database, positioning systems, cellular network
Published: 25.01.2017; Views: 2711; Downloads: 0
.pdf Fulltext (1,00 MB)

3.
Dealing with network changes and trajectories in patio-temporal databases for positioning systems
Andrea Viel, 2015, master's thesis

Found in: ključnih besedah
Keywords: database, positioning systems, cellular network
Published: 25.01.2017; Views: 2666; Downloads: 0
.pdf Fulltext (477,00 KB)

4.
ADRIART.CE Advancing Digital & Regional Interactions in the Art Teaching of Central Europe
Peter Purg, unpublished invited conference lecture

Found in: ključnih besedah
Summary of found: ...CEEPUS, network, vision, curriculum, development...
Keywords: CEEPUS, network, vision, curriculum, development
Published: 10.04.2017; Views: 2640; Downloads: 0
.pdf Fulltext (834,58 KB)

5.
Dealing with network changes in cellular fingerprint positioning systems
Chris Marshall, Federico Pittino, Andrea Dalla Torre, Donatella Gubiani, Angelo Montanari, Paolo Gallo, Andrea Viel, 2017, published scientific conference contribution

Abstract: Besides being a fundamental infrastructure for communication, cellular networks are exploited for positioning through signal fingerprinting. Maintaining the fingerprint database consistent and up-to-date is a challenging task in many fingerprint positioning systems, e.g., in those populated by a crowd-sourcing effort. To this end, detecting and tracking the changes in the configurations of cellular networks over time is recognized as a relevant problem. In this paper, we show that to cope with this problem we can successfully exploit information provided by Timing Advance (TA). As a by-product, we prove that TA can improve the fingerprint candidate selection phase, reducing the number of fingerprints to provide as input to positioning algorithms. The effectiveness of the proposed improvements has been tested on a fingerprint positioning system with a large fingerprint dataset collected over a period of 2 years.
Found in: ključnih besedah
Keywords: fingerprint positioning systems, cellular communication networks, network changes
Published: 13.06.2018; Views: 2322; Downloads: 0
.pdf Fulltext (4,64 MB)

6.
A cellular network database for fingerprint positioning systems
Angelo Montanari, Andrea Dalla Torre, Andrea Viel, Paolo Gallo, Donatella Gubiani, 2019, published scientific conference contribution

Abstract: Besides being a fundamental infrastructure for communication, cellular networks are increasingly exploited for positioning via signal fingerprinting. Here, we focus on cellular signal fingerprinting, where an accurate and comprehensive knowledge of the network is fundamental. We propose an original multilevel database for cellular networks, which can be automatically updated with new fingerprint measurements and makes it possible to execute a number of meaningful analyses. In particular, it allows one to monitor the distribution of cellular networks over countries, to determine the density of cells in different areas, and to detect inconsistencies in fingerprint observations.
Found in: ključnih besedah
Keywords: Cellular network, Signal fingerprinting, Multilevel database, Data analysis
Published: 17.09.2019; Views: 1763; Downloads: 0
.pdf Fulltext (2,40 MB)

7.
Internet traffic surveillance & network monitoring in India
Rajan Gupta, Sunil K. Muttoo, 2016, original scientific article

Abstract: Internet traffic surveillance is gaining importance in today’s digital world. Lots of international agencies are putting in efforts to monitor the network around their countries to see suspicious activities and illegal or illegitimate transmission of messages. India, being a center of attraction for terrorist activities, is also working towards the development of such surveillance systems. NETRA or Network Traffic Analysis is one such effort being taken by the Indian Government to filter suspicious keywords from messages in the network. But is it good enough to be used at the highest level for security analysis or does the system design needs to be improved as compared to other similar systems around the world; this question is answered through this study. The comparison of NETRA is done against Dish Fire, Prism, and Echelon. The design of the NETRA scheme and implementation level analysis of the system shows few weaknesses like limited memory options, limited channels for monitoring, pre-set filters, ignoring big data demands, security concerns, social values breach and ignoring ethical issues. These can be covered through alternate options which can improve the existing system. The Inclusion of self-similarity models, Self-Configuring Network Monitoring, and smart monitoring through early intrusion detections can be embedded in the architecture of existing surveillance system to give it more depth and make it more robust.
Found in: ključnih besedah
Keywords: cyber attacks, NETRA, network monitoring, network traffic analysis, surveillance system, spy system
Published: 01.04.2021; Views: 471; Downloads: 20
URL Fulltext (0,00 KB)
This document has many files! More...

8.
NETRA
2019, interview

Found in: ključnih besedah
Summary of found: ...Surveillance, Network Monitoring, NETRA, Network Traffic Regulation...
Keywords: Surveillance, Network Monitoring, NETRA, Network Traffic Regulation
Published: 03.04.2021; Views: 590; Downloads: 20
URL Fulltext (0,00 KB)
This document has many files! More...

9.
Design & analysis of clustering based intrusion detection schemes for e-governance
Saibal K. Pal, Rajan Gupta, Sunil K. Muttoo, 2016, published scientific conference contribution

Abstract: The problem of attacks on various networks and information systems is increasing. And with systems working in public domain like those involved under E-Governance are facing more problems than others. So there is a need to work on either designing an altogether different intrusion detection system or improvement of the existing schemes with better optimization techniques and easy experimental setup. The current study discusses the design of an Intrusion Detection Scheme based on traditional clustering schemes like K-Means and Fuzzy C-Means along with Meta-heuristic scheme like Particle Swarm Optimization. The experimental setup includes comparative analysis of these schemes based on a different metric called Classification Ratio and traditional metric like Detection Rate. The experiment is conducted on a regular Kyoto Data Set used by many researchers in past, however the features extracted from this data are selected based on their relevance to the E-Governance system. The results shows a better and higher classification ratio for the Fuzzy based clustering in conjunction with meta-heuristic schemes. The development and simulations are carried out using MATLAB.
Found in: ključnih besedah
Summary of found: ...intrusion detection, anomaly detection, intrusion detection system, network intrusion detection...
Keywords: particle swarm optimization, intrusion detection, anomaly detection, intrusion detection system, network intrusion detection
Published: 02.04.2021; Views: 569; Downloads: 2
URL Fulltext (0,00 KB)
This document has many files! More...

10.
Analysing security checkpoints for an integrated utility-based information system
Sunil K. Muttoo, Rajan Gupta, Saibal K. Pal, 2016, published scientific conference contribution

Abstract: With the rising digital medium, the various digital applications are rising too. These applications can work in the private domain or public domain depending upon the environment and features. Of late, the public infrastructure in India is improving and thus digitisation of the services and processes are making it better for the government to function. Lots of new services and applications are planned through desktop-and mobile-based information systems. But any information system requires a good security cover for it to function correctly and efficiently. One such new system was proposed for integrating the various utility systems in Delhi, NCR, for which various security checkpoints are discussed in this paper. These are related to database security, network security, cryptography, and the user authentication process. These checkpoints will be helpful in making the newly proposed information system more secure and will also be helpful in analysing the need and scope of new security features in it. Security concerns are analysed at different levels of the information system and suggestions are made for the system which can be implemented in the currently proposed system. These suggestions can also be used in other similar systems as well as for improving and enhancing security at various levels.
Found in: ključnih besedah
Summary of found: ...paper. These are related to database security, network security, cryptography, and the user authentication process....
Keywords: information systems, integrated utility system, database security, network security, data security, information system security, e-governance
Published: 15.07.2021; Views: 477; Downloads: 2
URL Fulltext (0,00 KB)
This document has many files! More...

Search done in 0 sec.
Back to top