SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
Natarajan Meghanathan (Eds) : WimoN, NC - 2013
pp. 49–53, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3705
WIRELESS COMPUTING AND IT
ECOSYSTEMS
William R Simpson
Institute for Defense Analyses, 4850 Mark Center Drive,
Alexandria, Virginia 22311 USA,
rsimpson@ida.org
ABSTRACT
We have evolved an IT system that is ubiquitous and pervasive and integrated into most aspects
of our lives. Many of us are working on 4th and 5th level refinements in efficiency and
functionality. But, we stand on the shoulders of those who came before and this restricts our
freedom of action. The prior work has left us with an ecosystem which is the living embodiment
of our state-of-the-art. While we work on integration, refinement, broader application and
efficiency, the results must move seamlessly into the ecosystem. Fundamental concepts are
being researched in the lab and may rebuild the world we all live in, until that happens, we must
work within the ecosystem.
KEYWORDS
Ecosystem, Wireless, Standards, Security, OSI, Vulnerabilities.
1. INTRODUCTION
Today, a combination of standards, applications, methodologies and interfaces has evolved into
an ecosystem call web 2.0. Although the name would indicate a new version of the World Wide
Web, it does not refer to any technical specification, but rather to the way software developers
and end-users use the web today [1]. O'Reilly Media publisher Dale Dougherty coined the phrase
Web 2.0 In 2004 [2]. Searching the web will not provide a clear definition of web 2.0. The
author takes the term as a maturity level of processes, standards, and applications that form an
ecosystem around which other applications and processes cannot diverge significantly or there
cost to adopt them will be excessive.
2. THE LAYERS OF AN ECOSYSTEM
The ecosystem is a living, breathing embodiment of an IT system of systems that is ubiquitous
and pervasive and integrated into most aspects of our lives. It adapts to environment changes and
enforces a measure of conformance by its very existence.
50 Computer Science & Information Technology (CS & IT)
2.1 Ecosystem Layers
Describing an architecture that conforms to these concepts requires specific elements and
standards, a partial sampling is given in references [3] – [7] to ensure the processes are built into
systems. The layers are similar to the layers in an onion as shown if figure 1.
Fig.1. The Layers of the Ecosystem
2.2 Layers within layers
The layers of figure 1 are exemplary and have not been blessed by any organization. Certain of
the sub-layers have. In figure 1 we have broken out the sub-layers of one category –
communications – and apply the open systems interconnect reference model [8] for its constituent
sub-layers shown below in figure 2. The model has been used for the definition of end points and
protocols for communications processes.
Fig.2. Secure Communication OSI Reference Model
Computer Science & Information Technology (CS & IT) 51
3. WORKING WITHIN THE LAYERS
Wherever you work in this ecosystem, you must be concerned with:
Functionality - A Manet must provide routing of messages to members of its network.
Efficiency - A pheromone based routing method must be more efficient than a priority-based
or round-robin routing to make it worth the added complexity.
Security - Even in ad-hoc Manet based networks we must protect our own assets and monitor
nefarious behaviors. The following are some threat mitigation and elimination that may be
considered:
a. Traditional threats
i. Threats against the OS and Network interfaces
ii. Authentication, Authorization attacks
iii. Man in the middle attacks inside / outside enterprise both on the platform and on
all comm. Links
iv. Configuration setup and Change based attacks,
v. Mobile software attacks
vi. Integrity Attacks [change security attributes, metadata record content]
vii. Design and Implementation threats
1. Buffer overflow, Static Analysis, Type checking
2. Web service attacks [cross site scripting,] others
3. Threats on Caches, Replays
b. Data at rest and data in Motion threats
c. Cryptographic key PKI private key and session key threats [Java]
d. Attacks on Virtualization [Minimal]
e. Attack on Inter Forest / Enclave Trust, TPM and Others …
f. Threats from Black Hat
Integrity – software, data, credentials all need to be validated as to source and tamper
resistance.
Standard Interfaces – unless we are in a standalone environment we must be able to
communicate with other elements in the ecosystem.
Records Management – Record pertinent events for monitoring and forensics:
a. Security violation
b. Performance issues
c. Fault recoveries
d. Health Monitoring
e. Behavioral Monitoring
f. Others dealing with the functionality
g. Etc.
52 Computer Science & Information Technology (CS & IT)
If you are not working in all of these areas, your work may not survive the laboratory.
4. VULNERABILITIES IN SOFTWARE
Vulnerabilities occur at all levels of software development. Most of the software developed for
wireless communication are coded to the middle of the OSI communications model.
Vulnerabilities are tracked and aggregated according to the software level, and the weaknesses in
coding by the Common Weakness Enumeration (CWE) [9] which describes itself as follows:
“CWE - International in scope and free for public use, CWE provides a unified,
measurable set of software weaknesses that is enabling more effective discussion,
description, selection, and use of software security tools and services that can find these
weaknesses in source code and operational systems as well as better understanding and
management of software weaknesses related to architecture and design.”
A summary by type is provided below as derived from the CWE for middleware coding
vulnerabilities. The broader category includes a broad range of middleware software including
Oracle data base code and Apache HTTP server code, but can be used as a gauge for software
vulnerabilities that arise during normal coding, using standard coding reviews. You could expect
the numbers to be considerably higher for software developed within academic experiments and
experimental code with less stringent development activities.
Table 1 Weakness Enumerations
Common Weakness Enumeration for Non-Website Vulnerabilities
1 Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) –
32%
2 Improper Control of Generation of Code ('Code Injection') (CWE-94) – 17%
3 Resource Management Errors (CWE-399) – 10%
4 Improper Input Validation (CWE-20) – 9%
5 Numeric Errors (CWE-189) – 8%
Middleware Coding Vulnerability Types
1 Improper Input Validation (CWE-20) – 11%
2 Resource Management Errors (CWE-399) – 11%
3 Improper Control of Generation of Code (‘Code Injection’) (CWE-94) – 9%
4 Numeric Errors (CWE-189) – 9%
5 Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) –
7%
5. SUMMARY
This paper has reviewed the eco-system that most research will eventually have to live within.
The ultimate goal is to have the algorithms coded into products and deployed into an enterprise or
web service environment. Shortly after your research phase and as you begin product
development remember these factors. At whatever layer you are working, you are responsible for;
Functionality, Efficiency, Security, Integrity, Standard Interfaces, Records Management (for
forensics), Etc. Shortfalls will have to be covered in the next level in the ecosystem, often at a
penalty in performance and efficiency. These items should be “baked in” not “added on”.
Computer Science & Information Technology (CS & IT) 53
Eliminate Common vulnerabilities. Your algorithm (no matter how efficient) may not become
productized or institutionalized if you miss these factors.
REFERENCES
[1] Web 2.0, http://en.wikipedia.org/wiki/Web_2.0
[2] How Web 2.0 Works, http://www.howstuffworks.com/web-20.htm
[3] World Wide Web Consortium (W3C):
a. "SOAP Version 1.2 Part 1: Messaging Framework (Second Edition)", April 27, 2007.
b. W3C XML Schema Definition Language (XSD) 1.1 Part 1: Structures, W3C Candidate
Recommendation 21 July 2011.
c. W3C XML Schema Definition Language (XSD) 1.1 Part 2: Datatypes, W3C Candidate
Recommendation 21 July 2011.
d. XML Encryption Requirements,W3C Note 04 March 2002
e. XML Signature Syntax and Processing (Second Edition),W3C Recommendation 10 June 2008.
f. And others
[4] Organization for the Advancement of Structured Information Standards (OASIS) open set of
Standards
a. “WS-Security Specification 1.1” OASIS, November 2006
b. “WS-Trust Specification 1.4”. OASIS, February 2009
c. “WS-ReliableMessaging Specification 1.1”, OASIS, November 2004
d. “WS-SecureConversation Specification 1.4”, OASIS, February 2009
e. “WS-BaseNotification”, 1.3 OASIS, October 2006.
f. And others
[5] Internet Engineering Task Force (IETF) Standards:
a. STD 66 (RFC3986) Uniform Resource Identifier (URI): Generic Syntax, T. Berners-Lee, R.
Fielding, L. Masinter, January 2005
b. STD 9 (RFC0959) File Transfer Protocol, J. Postel, J. Reynolds, October 1985.
c. STD 5 (RFC0791) Internet Protocol, J. Postel, September 1981.
d. LDAPv3: Technical Specification. J. Hodges, RL "Bob" Morgan. IETF RFC 3377, September
2002. Authentication Methods for LDAP. M. Wahl, H. Alvestrand, J. Hodges, R.L. Morgan. IETF
RFC 2829, May 2000.
e. And others
[6] National Institute of Standards, Gaithersburg, Md:
a. FIPS PUB 197, Advanced Encryption Standard (AES), November 2001.
b. FIPS PUB 800-67, , November 2008.
c. FIPS PUB 800-67, Version 1.2 , Recommendation for the Triple Data Encryption Algorithm
(TDEA) Block Cipher, Revised July 2011
d. FIPS PUB 140-2, Security Requirements for Cryptographic Modules, May 25, 2001
e. FIPS PUB 180-2, Secure Hash Standard. August 2002, U.S. Department of Commerce/National
Institute of Standards and Technology
f. FIPS PUB 186-3, Digital Signature Standard (DSS), June, 2009
g. And others
[7] Common Criteria for Information Technology Security Evaluation:
a. Version 3.1, revision 3, July 2009. Part 1: Introduction and general model.
b. Version 3.1, revision 3, July 2009. Part 2: Functional security components.
c. Version 3.1, revision 3, July 2009. Part 3: Assurance security components.
d. Common Methodology for Information Technology Security Evaluation, Version 3.1, revision 3,
July 2009
[8] Open System Interconnect reference model, http://osilayers.org/
[9] Common Weakness Enumeration, A Community-Developed Dictionary of Software Weakness
Types, http://cwe.mitre.org/

Contenu connexe

Tendances

Icssea 2013 arrl_final_08102013
Icssea 2013 arrl_final_08102013Icssea 2013 arrl_final_08102013
Icssea 2013 arrl_final_08102013Vincenzo De Florio
 
Software Security Testing
Software Security TestingSoftware Security Testing
Software Security Testingankitmehta21
 
Thomas Jones Resume Nov 2014
Thomas Jones Resume Nov 2014Thomas Jones Resume Nov 2014
Thomas Jones Resume Nov 2014Thomas Jones
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing SuiteIRJET Journal
 
Qualifications
QualificationsQualifications
Qualificationsdouk66t6gr
 
Qualifications
QualificationsQualifications
Qualificationsdouk66t6gr
 
Standardizing Source Code Security Audits
Standardizing Source Code Security AuditsStandardizing Source Code Security Audits
Standardizing Source Code Security Auditsijseajournal
 
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 StandardAnalyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 StandardIJCSIS Research Publications
 
Ch11-Software Engineering 9
Ch11-Software Engineering 9Ch11-Software Engineering 9
Ch11-Software Engineering 9Ian Sommerville
 
Rational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability AssessmentRational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability AssessmentVESIT/University of Mumbai
 
Behavioral and performance analysis model for malware detection techniques
Behavioral and performance analysis model for malware detection techniquesBehavioral and performance analysis model for malware detection techniques
Behavioral and performance analysis model for malware detection techniquesIAEME Publication
 
Current Topics paper A4 submission 4.30.2015 Master Copy
Current Topics paper A4 submission 4.30.2015 Master CopyCurrent Topics paper A4 submission 4.30.2015 Master Copy
Current Topics paper A4 submission 4.30.2015 Master CopyTommie Walls
 

Tendances (17)

Icssea 2013 arrl_final_08102013
Icssea 2013 arrl_final_08102013Icssea 2013 arrl_final_08102013
Icssea 2013 arrl_final_08102013
 
Software Security Testing
Software Security TestingSoftware Security Testing
Software Security Testing
 
Thomas Jones Resume Nov 2014
Thomas Jones Resume Nov 2014Thomas Jones Resume Nov 2014
Thomas Jones Resume Nov 2014
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
 
Qualifications
QualificationsQualifications
Qualifications
 
Qualifications
QualificationsQualifications
Qualifications
 
Ch10 dependable systems
Ch10 dependable systemsCh10 dependable systems
Ch10 dependable systems
 
Standardizing Source Code Security Audits
Standardizing Source Code Security AuditsStandardizing Source Code Security Audits
Standardizing Source Code Security Audits
 
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 StandardAnalyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
Analyse Security of the Disassociation Procedure in the IEEE 802.15.4 Standard
 
Presentation
PresentationPresentation
Presentation
 
Giuffre_2014a_ITT
Giuffre_2014a_ITTGiuffre_2014a_ITT
Giuffre_2014a_ITT
 
Ch11-Software Engineering 9
Ch11-Software Engineering 9Ch11-Software Engineering 9
Ch11-Software Engineering 9
 
Ch13 security engineering
Ch13 security engineeringCh13 security engineering
Ch13 security engineering
 
Hp2513711375
Hp2513711375Hp2513711375
Hp2513711375
 
Rational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability AssessmentRational Unified Treatment for Web Application Vulnerability Assessment
Rational Unified Treatment for Web Application Vulnerability Assessment
 
Behavioral and performance analysis model for malware detection techniques
Behavioral and performance analysis model for malware detection techniquesBehavioral and performance analysis model for malware detection techniques
Behavioral and performance analysis model for malware detection techniques
 
Current Topics paper A4 submission 4.30.2015 Master Copy
Current Topics paper A4 submission 4.30.2015 Master CopyCurrent Topics paper A4 submission 4.30.2015 Master Copy
Current Topics paper A4 submission 4.30.2015 Master Copy
 

Similaire à WIRELESS COMPUTING AND IT ECOSYSTEMS

Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIJERA Editor
 
An Overview Of The Singularity Project
An  Overview Of The  Singularity  ProjectAn  Overview Of The  Singularity  Project
An Overview Of The Singularity Projectalanocu
 
A Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise CloudA Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise CloudJeff Nelson
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET Journal
 
IRJET- Sandbox Technology
IRJET- Sandbox TechnologyIRJET- Sandbox Technology
IRJET- Sandbox TechnologyIRJET Journal
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420Steve Goeringer
 
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingCrypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingIRJET Journal
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content StorageIRJET Journal
 
Vulnerability Management in IT Infrastructure
Vulnerability Management in IT InfrastructureVulnerability Management in IT Infrastructure
Vulnerability Management in IT InfrastructureIRJET Journal
 
Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Alexander Decker
 
Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Alexander Decker
 
Security Introspection for Software Reuse
Security Introspection for Software ReuseSecurity Introspection for Software Reuse
Security Introspection for Software ReuseIRJET Journal
 
IRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software DesignIRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software DesignIRJET Journal
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentationaksit_services
 
Trends in Embedded Software Engineering
Trends in Embedded Software EngineeringTrends in Embedded Software Engineering
Trends in Embedded Software EngineeringAditya Kamble
 

Similaire à WIRELESS COMPUTING AND IT ECOSYSTEMS (20)

Indexing Building Evaluation Criteria
Indexing Building Evaluation CriteriaIndexing Building Evaluation Criteria
Indexing Building Evaluation Criteria
 
An Overview Of The Singularity Project
An  Overview Of The  Singularity  ProjectAn  Overview Of The  Singularity  Project
An Overview Of The Singularity Project
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
A Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise CloudA Resiliency Framework For An Enterprise Cloud
A Resiliency Framework For An Enterprise Cloud
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
IRJET- An EFficiency and Privacy-Preserving Biometric Identification Scheme i...
 
IRJET- Sandbox Technology
IRJET- Sandbox TechnologyIRJET- Sandbox Technology
IRJET- Sandbox Technology
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420
 
CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
 
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over NetworkingCrypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
Vulnerability Management in IT Infrastructure
Vulnerability Management in IT InfrastructureVulnerability Management in IT Infrastructure
Vulnerability Management in IT Infrastructure
 
Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...
 
Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...
 
Security Introspection for Software Reuse
Security Introspection for Software ReuseSecurity Introspection for Software Reuse
Security Introspection for Software Reuse
 
publishable paper
publishable paperpublishable paper
publishable paper
 
IRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software DesignIRJET- Software Architecture and Software Design
IRJET- Software Architecture and Software Design
 
Aksit profile final
Aksit profile finalAksit profile final
Aksit profile final
 
AKS IT Corporate Presentation
AKS IT Corporate PresentationAKS IT Corporate Presentation
AKS IT Corporate Presentation
 
Trends in Embedded Software Engineering
Trends in Embedded Software EngineeringTrends in Embedded Software Engineering
Trends in Embedded Software Engineering
 

Plus de cscpconf

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
 

Plus de cscpconf (20)

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
 

Dernier

Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxRosabel UA
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 

Dernier (20)

Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Presentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptxPresentation Activity 2. Unit 3 transv.pptx
Presentation Activity 2. Unit 3 transv.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 

WIRELESS COMPUTING AND IT ECOSYSTEMS

  • 1. Natarajan Meghanathan (Eds) : WimoN, NC - 2013 pp. 49–53, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3705 WIRELESS COMPUTING AND IT ECOSYSTEMS William R Simpson Institute for Defense Analyses, 4850 Mark Center Drive, Alexandria, Virginia 22311 USA, rsimpson@ida.org ABSTRACT We have evolved an IT system that is ubiquitous and pervasive and integrated into most aspects of our lives. Many of us are working on 4th and 5th level refinements in efficiency and functionality. But, we stand on the shoulders of those who came before and this restricts our freedom of action. The prior work has left us with an ecosystem which is the living embodiment of our state-of-the-art. While we work on integration, refinement, broader application and efficiency, the results must move seamlessly into the ecosystem. Fundamental concepts are being researched in the lab and may rebuild the world we all live in, until that happens, we must work within the ecosystem. KEYWORDS Ecosystem, Wireless, Standards, Security, OSI, Vulnerabilities. 1. INTRODUCTION Today, a combination of standards, applications, methodologies and interfaces has evolved into an ecosystem call web 2.0. Although the name would indicate a new version of the World Wide Web, it does not refer to any technical specification, but rather to the way software developers and end-users use the web today [1]. O'Reilly Media publisher Dale Dougherty coined the phrase Web 2.0 In 2004 [2]. Searching the web will not provide a clear definition of web 2.0. The author takes the term as a maturity level of processes, standards, and applications that form an ecosystem around which other applications and processes cannot diverge significantly or there cost to adopt them will be excessive. 2. THE LAYERS OF AN ECOSYSTEM The ecosystem is a living, breathing embodiment of an IT system of systems that is ubiquitous and pervasive and integrated into most aspects of our lives. It adapts to environment changes and enforces a measure of conformance by its very existence.
  • 2. 50 Computer Science & Information Technology (CS & IT) 2.1 Ecosystem Layers Describing an architecture that conforms to these concepts requires specific elements and standards, a partial sampling is given in references [3] – [7] to ensure the processes are built into systems. The layers are similar to the layers in an onion as shown if figure 1. Fig.1. The Layers of the Ecosystem 2.2 Layers within layers The layers of figure 1 are exemplary and have not been blessed by any organization. Certain of the sub-layers have. In figure 1 we have broken out the sub-layers of one category – communications – and apply the open systems interconnect reference model [8] for its constituent sub-layers shown below in figure 2. The model has been used for the definition of end points and protocols for communications processes. Fig.2. Secure Communication OSI Reference Model
  • 3. Computer Science & Information Technology (CS & IT) 51 3. WORKING WITHIN THE LAYERS Wherever you work in this ecosystem, you must be concerned with: Functionality - A Manet must provide routing of messages to members of its network. Efficiency - A pheromone based routing method must be more efficient than a priority-based or round-robin routing to make it worth the added complexity. Security - Even in ad-hoc Manet based networks we must protect our own assets and monitor nefarious behaviors. The following are some threat mitigation and elimination that may be considered: a. Traditional threats i. Threats against the OS and Network interfaces ii. Authentication, Authorization attacks iii. Man in the middle attacks inside / outside enterprise both on the platform and on all comm. Links iv. Configuration setup and Change based attacks, v. Mobile software attacks vi. Integrity Attacks [change security attributes, metadata record content] vii. Design and Implementation threats 1. Buffer overflow, Static Analysis, Type checking 2. Web service attacks [cross site scripting,] others 3. Threats on Caches, Replays b. Data at rest and data in Motion threats c. Cryptographic key PKI private key and session key threats [Java] d. Attacks on Virtualization [Minimal] e. Attack on Inter Forest / Enclave Trust, TPM and Others … f. Threats from Black Hat Integrity – software, data, credentials all need to be validated as to source and tamper resistance. Standard Interfaces – unless we are in a standalone environment we must be able to communicate with other elements in the ecosystem. Records Management – Record pertinent events for monitoring and forensics: a. Security violation b. Performance issues c. Fault recoveries d. Health Monitoring e. Behavioral Monitoring f. Others dealing with the functionality g. Etc.
  • 4. 52 Computer Science & Information Technology (CS & IT) If you are not working in all of these areas, your work may not survive the laboratory. 4. VULNERABILITIES IN SOFTWARE Vulnerabilities occur at all levels of software development. Most of the software developed for wireless communication are coded to the middle of the OSI communications model. Vulnerabilities are tracked and aggregated according to the software level, and the weaknesses in coding by the Common Weakness Enumeration (CWE) [9] which describes itself as follows: “CWE - International in scope and free for public use, CWE provides a unified, measurable set of software weaknesses that is enabling more effective discussion, description, selection, and use of software security tools and services that can find these weaknesses in source code and operational systems as well as better understanding and management of software weaknesses related to architecture and design.” A summary by type is provided below as derived from the CWE for middleware coding vulnerabilities. The broader category includes a broad range of middleware software including Oracle data base code and Apache HTTP server code, but can be used as a gauge for software vulnerabilities that arise during normal coding, using standard coding reviews. You could expect the numbers to be considerably higher for software developed within academic experiments and experimental code with less stringent development activities. Table 1 Weakness Enumerations Common Weakness Enumeration for Non-Website Vulnerabilities 1 Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) – 32% 2 Improper Control of Generation of Code ('Code Injection') (CWE-94) – 17% 3 Resource Management Errors (CWE-399) – 10% 4 Improper Input Validation (CWE-20) – 9% 5 Numeric Errors (CWE-189) – 8% Middleware Coding Vulnerability Types 1 Improper Input Validation (CWE-20) – 11% 2 Resource Management Errors (CWE-399) – 11% 3 Improper Control of Generation of Code (‘Code Injection’) (CWE-94) – 9% 4 Numeric Errors (CWE-189) – 9% 5 Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) – 7% 5. SUMMARY This paper has reviewed the eco-system that most research will eventually have to live within. The ultimate goal is to have the algorithms coded into products and deployed into an enterprise or web service environment. Shortly after your research phase and as you begin product development remember these factors. At whatever layer you are working, you are responsible for; Functionality, Efficiency, Security, Integrity, Standard Interfaces, Records Management (for forensics), Etc. Shortfalls will have to be covered in the next level in the ecosystem, often at a penalty in performance and efficiency. These items should be “baked in” not “added on”.
  • 5. Computer Science & Information Technology (CS & IT) 53 Eliminate Common vulnerabilities. Your algorithm (no matter how efficient) may not become productized or institutionalized if you miss these factors. REFERENCES [1] Web 2.0, http://en.wikipedia.org/wiki/Web_2.0 [2] How Web 2.0 Works, http://www.howstuffworks.com/web-20.htm [3] World Wide Web Consortium (W3C): a. "SOAP Version 1.2 Part 1: Messaging Framework (Second Edition)", April 27, 2007. b. W3C XML Schema Definition Language (XSD) 1.1 Part 1: Structures, W3C Candidate Recommendation 21 July 2011. c. W3C XML Schema Definition Language (XSD) 1.1 Part 2: Datatypes, W3C Candidate Recommendation 21 July 2011. d. XML Encryption Requirements,W3C Note 04 March 2002 e. XML Signature Syntax and Processing (Second Edition),W3C Recommendation 10 June 2008. f. And others [4] Organization for the Advancement of Structured Information Standards (OASIS) open set of Standards a. “WS-Security Specification 1.1” OASIS, November 2006 b. “WS-Trust Specification 1.4”. OASIS, February 2009 c. “WS-ReliableMessaging Specification 1.1”, OASIS, November 2004 d. “WS-SecureConversation Specification 1.4”, OASIS, February 2009 e. “WS-BaseNotification”, 1.3 OASIS, October 2006. f. And others [5] Internet Engineering Task Force (IETF) Standards: a. STD 66 (RFC3986) Uniform Resource Identifier (URI): Generic Syntax, T. Berners-Lee, R. Fielding, L. Masinter, January 2005 b. STD 9 (RFC0959) File Transfer Protocol, J. Postel, J. Reynolds, October 1985. c. STD 5 (RFC0791) Internet Protocol, J. Postel, September 1981. d. LDAPv3: Technical Specification. J. Hodges, RL "Bob" Morgan. IETF RFC 3377, September 2002. Authentication Methods for LDAP. M. Wahl, H. Alvestrand, J. Hodges, R.L. Morgan. IETF RFC 2829, May 2000. e. And others [6] National Institute of Standards, Gaithersburg, Md: a. FIPS PUB 197, Advanced Encryption Standard (AES), November 2001. b. FIPS PUB 800-67, , November 2008. c. FIPS PUB 800-67, Version 1.2 , Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, Revised July 2011 d. FIPS PUB 140-2, Security Requirements for Cryptographic Modules, May 25, 2001 e. FIPS PUB 180-2, Secure Hash Standard. August 2002, U.S. Department of Commerce/National Institute of Standards and Technology f. FIPS PUB 186-3, Digital Signature Standard (DSS), June, 2009 g. And others [7] Common Criteria for Information Technology Security Evaluation: a. Version 3.1, revision 3, July 2009. Part 1: Introduction and general model. b. Version 3.1, revision 3, July 2009. Part 2: Functional security components. c. Version 3.1, revision 3, July 2009. Part 3: Assurance security components. d. Common Methodology for Information Technology Security Evaluation, Version 3.1, revision 3, July 2009 [8] Open System Interconnect reference model, http://osilayers.org/ [9] Common Weakness Enumeration, A Community-Developed Dictionary of Software Weakness Types, http://cwe.mitre.org/