Repozitorij Univerze v Novi Gorici

Iskanje po repozitoriju
A+ | A- | Pomoč | SLO | ENG

Iskalni niz: išči po
išči po
išči po
išči po
* po starem in bolonjskem študiju

Opcije:
  Ponastavi


1 - 10 / 10
Na začetekNa prejšnjo stran1Na naslednjo stranNa konec
1.
2.
A spatio-temporal database for positioning systems: the case of CellLocate
Marco Tosolini, 2014, magistrsko delo

Najdeno v: ključnih besedah
Ključne besede: database, positioning systems, cellular network
Objavljeno: 25.01.2017; Ogledov: 2281; Prenosov: 0
.pdf Polno besedilo (1,00 MB)

3.
Dealing with network changes and trajectories in patio-temporal databases for positioning systems
Andrea Viel, 2015, magistrsko delo

Najdeno v: ključnih besedah
Ključne besede: database, positioning systems, cellular network
Objavljeno: 25.01.2017; Ogledov: 2189; Prenosov: 0
.pdf Polno besedilo (477,00 KB)

4.
ADRIART.CE Advancing Digital & Regional Interactions in the Art Teaching of Central Europe
Peter Purg, vabljeno predavanje na konferenci brez natisa

Najdeno v: ključnih besedah
Povzetek najdenega: ...CEEPUS, network, vision, curriculum, development...
Ključne besede: CEEPUS, network, vision, curriculum, development
Objavljeno: 10.04.2017; Ogledov: 2237; Prenosov: 0
.pdf Polno besedilo (834,58 KB)

5.
Dealing with network changes in cellular fingerprint positioning systems
Chris Marshall, Federico Pittino, Andrea Dalla Torre, Donatella Gubiani, Angelo Montanari, Paolo Gallo, Andrea Viel, 2017, objavljeni znanstveni prispevek na konferenci

Opis: Besides being a fundamental infrastructure for communication, cellular networks are exploited for positioning through signal fingerprinting. Maintaining the fingerprint database consistent and up-to-date is a challenging task in many fingerprint positioning systems, e.g., in those populated by a crowd-sourcing effort. To this end, detecting and tracking the changes in the configurations of cellular networks over time is recognized as a relevant problem. In this paper, we show that to cope with this problem we can successfully exploit information provided by Timing Advance (TA). As a by-product, we prove that TA can improve the fingerprint candidate selection phase, reducing the number of fingerprints to provide as input to positioning algorithms. The effectiveness of the proposed improvements has been tested on a fingerprint positioning system with a large fingerprint dataset collected over a period of 2 years.
Najdeno v: ključnih besedah
Ključne besede: fingerprint positioning systems, cellular communication networks, network changes
Objavljeno: 13.06.2018; Ogledov: 1886; Prenosov: 0
.pdf Polno besedilo (4,64 MB)

6.
A cellular network database for fingerprint positioning systems
Angelo Montanari, Andrea Dalla Torre, Andrea Viel, Paolo Gallo, Donatella Gubiani, 2019, objavljeni znanstveni prispevek na konferenci

Opis: Besides being a fundamental infrastructure for communication, cellular networks are increasingly exploited for positioning via signal fingerprinting. Here, we focus on cellular signal fingerprinting, where an accurate and comprehensive knowledge of the network is fundamental. We propose an original multilevel database for cellular networks, which can be automatically updated with new fingerprint measurements and makes it possible to execute a number of meaningful analyses. In particular, it allows one to monitor the distribution of cellular networks over countries, to determine the density of cells in different areas, and to detect inconsistencies in fingerprint observations.
Najdeno v: ključnih besedah
Ključne besede: Cellular network, Signal fingerprinting, Multilevel database, Data analysis
Objavljeno: 17.09.2019; Ogledov: 1326; Prenosov: 0
.pdf Polno besedilo (2,40 MB)

7.
Internet traffic surveillance & network monitoring in India
Rajan Gupta, Sunil K. Muttoo, 2016, izvirni znanstveni članek

Opis: Internet traffic surveillance is gaining importance in today’s digital world. Lots of international agencies are putting in efforts to monitor the network around their countries to see suspicious activities and illegal or illegitimate transmission of messages. India, being a center of attraction for terrorist activities, is also working towards the development of such surveillance systems. NETRA or Network Traffic Analysis is one such effort being taken by the Indian Government to filter suspicious keywords from messages in the network. But is it good enough to be used at the highest level for security analysis or does the system design needs to be improved as compared to other similar systems around the world; this question is answered through this study. The comparison of NETRA is done against Dish Fire, Prism, and Echelon. The design of the NETRA scheme and implementation level analysis of the system shows few weaknesses like limited memory options, limited channels for monitoring, pre-set filters, ignoring big data demands, security concerns, social values breach and ignoring ethical issues. These can be covered through alternate options which can improve the existing system. The Inclusion of self-similarity models, Self-Configuring Network Monitoring, and smart monitoring through early intrusion detections can be embedded in the architecture of existing surveillance system to give it more depth and make it more robust.
Najdeno v: ključnih besedah
Ključne besede: cyber attacks, NETRA, network monitoring, network traffic analysis, surveillance system, spy system
Objavljeno: 01.04.2021; Ogledov: 152; Prenosov: 8
URL Polno besedilo (0,00 KB)
Gradivo ima več datotek! Več...

8.
NETRA
2019, intervju

Najdeno v: ključnih besedah
Povzetek najdenega: ...Surveillance, Network Monitoring, NETRA, Network Traffic Regulation...
Ključne besede: Surveillance, Network Monitoring, NETRA, Network Traffic Regulation
Objavljeno: 03.04.2021; Ogledov: 252; Prenosov: 8
URL Polno besedilo (0,00 KB)
Gradivo ima več datotek! Več...

9.
Design & analysis of clustering based intrusion detection schemes for e-governance
Saibal K. Pal, Rajan Gupta, Sunil K. Muttoo, 2016, objavljeni znanstveni prispevek na konferenci

Opis: The problem of attacks on various networks and information systems is increasing. And with systems working in public domain like those involved under E-Governance are facing more problems than others. So there is a need to work on either designing an altogether different intrusion detection system or improvement of the existing schemes with better optimization techniques and easy experimental setup. The current study discusses the design of an Intrusion Detection Scheme based on traditional clustering schemes like K-Means and Fuzzy C-Means along with Meta-heuristic scheme like Particle Swarm Optimization. The experimental setup includes comparative analysis of these schemes based on a different metric called Classification Ratio and traditional metric like Detection Rate. The experiment is conducted on a regular Kyoto Data Set used by many researchers in past, however the features extracted from this data are selected based on their relevance to the E-Governance system. The results shows a better and higher classification ratio for the Fuzzy based clustering in conjunction with meta-heuristic schemes. The development and simulations are carried out using MATLAB.
Najdeno v: ključnih besedah
Povzetek najdenega: ...intrusion detection, anomaly detection, intrusion detection system, network intrusion detection...
Ključne besede: particle swarm optimization, intrusion detection, anomaly detection, intrusion detection system, network intrusion detection
Objavljeno: 02.04.2021; Ogledov: 215; Prenosov: 1
URL Polno besedilo (0,00 KB)
Gradivo ima več datotek! Več...

10.
Analysing security checkpoints for an integrated utility-based information system
Sunil K. Muttoo, Rajan Gupta, Saibal K. Pal, 2016, objavljeni znanstveni prispevek na konferenci

Opis: With the rising digital medium, the various digital applications are rising too. These applications can work in the private domain or public domain depending upon the environment and features. Of late, the public infrastructure in India is improving and thus digitisation of the services and processes are making it better for the government to function. Lots of new services and applications are planned through desktop-and mobile-based information systems. But any information system requires a good security cover for it to function correctly and efficiently. One such new system was proposed for integrating the various utility systems in Delhi, NCR, for which various security checkpoints are discussed in this paper. These are related to database security, network security, cryptography, and the user authentication process. These checkpoints will be helpful in making the newly proposed information system more secure and will also be helpful in analysing the need and scope of new security features in it. Security concerns are analysed at different levels of the information system and suggestions are made for the system which can be implemented in the currently proposed system. These suggestions can also be used in other similar systems as well as for improving and enhancing security at various levels.
Najdeno v: ključnih besedah
Povzetek najdenega: ...paper. These are related to database security, network security, cryptography, and the user authentication process....
Ključne besede: information systems, integrated utility system, database security, network security, data security, information system security, e-governance
Objavljeno: 15.07.2021; Ogledov: 95; Prenosov: 1
URL Polno besedilo (0,00 KB)
Gradivo ima več datotek! Več...

Iskanje izvedeno v 0 sek.
Na vrh