This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemented in security watchdogs such as Microsoft EMET.
Chapters also explain the principle of control-flow integrity (CFI), highlight the benefits of CFI and discuss its current weaknesses. Several improved and sophisticated return-oriented programming attack techniques such as just-in-time...
This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks an...
This SpringerBrief summarizes the development of Distributed Hash Table in both academic and industrial fields. It covers the main theory, platforms and applications of this key part in distributed systems and applications, especially in large-scale distributed environments. The authors teach the principles of several popular DHT platforms that can solve practical problems such as load balance, multiple replicas, consistency and latency. They also propose DHT-based applications including multicast, anycast, distributed file systems, search, storage, content delivery network, file sharing and...
This SpringerBrief summarizes the development of Distributed Hash Table in both academic and industrial fields. It covers the main theory, platforms a...
This SpringerBrief presents a survey of data center network designs and topologies and compares several properties in order to highlight their advantages and disadvantages. The brief also explores several routing protocols designed for these topologies and compares the basic algorithms to establish connections, the techniques used to gain better performance, and the mechanisms for fault-tolerance. Readers will be equipped to understand how current research on data center networks enables the design of future architectures that can improve performance and dependability of data centers. This...
This SpringerBrief presents a survey of data center network designs and topologies and compares several properties in order to highlight their advanta...
This brief presents several new query processing techniques, called complex motion pattern queries, specifically designed for very large spatio-temporal databases of moving objects. The brief begins with the definition of flexible pattern queries, which are powerful because of the integration of variables and motion patterns. This is followed by a summary of the expressive power of patterns and flexibility of pattern queries. The brief then present the Spatio-Temporal Pattern System (STPS) and density-based pattern queries. STPS databases contain millions of records with information about...
This brief presents several new query processing techniques, called complex motion pattern queries, specifically designed for very large spatio-tempor...
In the last few years, there has been extensive research activity in the emerging area of Intermittently Connected Mobile Ad Hoc Networks (ICMANs). By considering the nature of intermittent connectivity in most real word mobile environments without any restrictions placed on users' behavior, ICMANs are eventually formed without any assumption with regard to the existence of a end-to-end path between two nodes wishing to communicate. It is different from the conventional Mobile Ad Hoc Networks (MANETs), which have been implicitly viewed as a connected graph with established complete paths...
In the last few years, there has been extensive research activity in the emerging area of Intermittently Connected Mobile Ad Hoc Networks (ICMANs). By...
Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft detection, plagiarism detection, and software clone detection. Extracting program features, processing those features into suitable representations, and constructing distance metrics to define similarity and dissimilarity are the key methods to identify software variants, clones, derivatives, and classes of software. Software Similarity and Classification reviews the literature of those core concepts, in addition to relevant literature in each...
Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft...
Machine learning and nonparametric function estimation procedures can be effectively used in forecasting. One important and current application is used to make forecasts of "future dangerousness" to inform criminal justice decision. Examples include the decision to release an individual on parole, determination of the parole conditions, bail recommendations, and sentencing. Since the 1920s, "risk assessments" of various kinds have been used in parole hearings, but the current availability of large administrative data bases, inexpensive computing power, and developments in statistics and...
Machine learning and nonparametric function estimation procedures can be effectively used in forecasting. One important and current application is use...
This book describes a computational framework for real-time detection of psychological signals related to Post-Traumatic Stress Disorder (PTSD) in online text-based posts, including blogs and web forums. Further, it explores how emerging computational techniques such as sentiment mining can be used in real-time to identify posts that contain PTSD-related signals, flag those posts, and bring them to the attention of psychologists, thus providing an automated flag and referral capability. The use of sentiment extraction technologies allows automatic in-depth analysis of opinions and emotions...
This book describes a computational framework for real-time detection of psychological signals related to Post-Traumatic Stress Disorder (PTSD) in onl...
Cooperative transmission aims to improve the reliability of wireless mobile communications through the use of diversity provided by additional relays assisting in the transmission between the source and destination nodes. This is possible as the rationale behind spatio-temporal processing can be easily mapped onto networked systems. Autonomic Cooperative Networking studies the further evolution of this phenomenon by first involving the network layer routines and then additionally incorporating the notion of autonomic system design.
Cooperative transmission aims to improve the reliability of wireless mobile communications through the use of diversity provided by additional relays ...
This book provides an analysis of transmission power and network performance in different wireless communication networks. It presents the latest research and techniques for power and interference control and performance modeling in wireless communication networks with different network topologies, air interfaces, and transmission techniques. While studying the power distributions and resource management, the reader will also learn basic methodology and skills for problem formulations, can ascertain the complexity for designing radio resource management strategies in modern wireless...
This book provides an analysis of transmission power and network performance in different wireless communication networks. It presents the latest rese...