- Advanced Malware Detection Techniques
- Internet Traffic Analysis and Secure E-voting
- Cybercrime and Law Enforcement Studies
- Network Packet Processing and Optimization
- Network Security and Intrusion Detection
- Spam and Phishing Detection
- Web Data Mining and Analysis
- Information Retrieval and Search Behavior
- Digital and Cyber Forensics
- Recommender Systems and Techniques
- Cloud Computing and Resource Management
- Image Retrieval and Classification Techniques
- IoT and Edge/Fog Computing
- User Authentication and Security Systems
- Web Application Security Vulnerabilities
- Service-Oriented Architecture and Web Services
- IPv6, Mobility, Handover, Networks, Security
- Advanced Image and Video Retrieval Techniques
- IoT-based Smart Home Systems
- Software System Performance and Reliability
- Advanced Memory and Neural Computing
- Human Mobility and Location-Based Analysis
- Educational Leadership and Practices
- Caching and Content Delivery
- Opportunistic and Delay-Tolerant Networks
University of the Fraser Valley
2023
Kwantlen Polytechnic University
2014-2019
Coventry University
2011-2013
With the various and increasingly malicious attacks on networks wireless systems, traditional security tools such as anti-virus programs firewalls are not sufficient to provide free, integrated, reliable secure networks. Intrusion detection systems (IDSs) one of most tested technologies monitor incoming outgoing network traffic identify unauthorized usage mishandling computer system It is critical implement intrusion (NIDSs) in that have high high-speed connectivity. Due fact software NIDSs...
This paper is concerned with the issue of low quality web search results and ways improving it. Information sources are exponentially increasing on making it increasingly difficult to get relevant information. The depends two factors: information needs users searching techniques. In order improve necessary have about user requirements. attempts address through profiling technique, where profiles can be explicitly specified or implicitly generated. proposed approach in this based explicit...
The telecommunications industry uses a combination of 2G (GSM), 3G (UMTS) and 4G (LTE) systems to access communication worldwide. Concurrent with recent rise in cyber-attacks, the requirement for secure infrastructure is increasingly crucial. However, while each new standard offers better protection mobile users, currently 84% households UK have signal from four leading providers. Users are expected be aware possible security threats, however auditing existing responsibility administrators....
Under most circumstances, cyber criminals will commit fraudulent transactions using proxy services which hide their real IP address and physical location. This is done in an effort to avoid being tracked prosecuted by law enforcement agencies. paper presents the investigation of a detection methodology efforts implement such technology into business solution with sole purpose eliminating majority transaction attempts. The approach, described this identifies multiple connectivity methods,...
The personalization process can either be focused on individuals and their interaction with documents, or the identification of shared patterns behavior segmentation user population into groups common interests. One issue in filtering processes is selection an appropriate model for efficient representation manipulation profiles documents. It should capable facilitating determination relevant documents terms similarity between users aim this paper to introduce three models representing search...
One of the main challenges in search engine quality service is how to satisfy needs and interests individual users. This raises fundamental issue identify select information that relevant a specific user. concern over generic provision lack precision have provided impetus for research into Web Search personalisation. In this paper hybrid user profiling system proposed - combination explicit implicit profiles improving web effectiveness terms recall. The content-based implements Vector Space...
"Big data" is a term that widely used by large corporations today. With access to vast infrastructure and collection of personal information not publicly available, the United States America (US) able complete researches projects are out reach most countries corporations. This paper will examine three US companies have successfully utilized big data. government's uses data across variety fields examined as well. An evaluation be concluded towards end analyze advantages disadvantages comparing those
Network Intrusion Detection and Prevention Systems (NIDPSs) are used to detect, prevent report evidence of attacks malicious traffic.Our paper presents a study where we open source NIDPS software.We show that detection performance can be weak in the face high-speed high-load traffic terms missed alerts logs.To counteract this problem, have proposed evaluated solution utilizes QoS, queues parallel technologies multi-layer Cisco Catalyst Switch increase NIDPSs performance.Our approach designs...
Web based project management system provides communication and various functionalities for small to midsize businesses. The proposed integrates organizational tools which utilizes PHP, JavaScript, CSS, Bootstrap, MySQL, HTML SSL. is designed allow expansion development businesses improve efficiency user engagement in terms of usability flexibility. will provide organizations with an application platform develop a environment analyze business functions employee participation.
By engaging students in activities that involve knowledge and understanding construction, active learning approaches help learn more effectively. In this paper, we present two techniques were successfully implemented different computing courses using Padlet educational tool. The first technique involves collecting feedback from after the month during class time a live platform, such as Padlet. Students' can be used to inform instruction promote throughout semester. addition, an enhanced...
In this paper, the development of a driver deployment and communication system for food delivery service company is discussed. The client seeks to improve its infrastructure by implementing new over existing that utilizes traditional methods. By using various cloud-based server technologies, we were able deliver fulfilled all requirements set out client.
The Internet of Things (IoT) is a network interconnected devices, sensors, and systems that communicate without human intervention. This technology involves embedded software, wireless communication protocols enable devices to collect exchange data in real-time. allows businesses individuals monitor control various aspects their environment, from temperature humidity security energy consumption providing intelligent insights automating tasks. However, these increasingly connected bring...
It has been recognized that current phishing filters in existence today are steadily lacking effectiveness. Furthermore, users and organizations appropriate security policies education, which led to massive reports of data privacy breaches organizations. To address this issue, a filter is proposed will build upon broaden the scope existing techniques. This paper presents solutions window vulnerability problem blacklists database, as well focus on search-engine heuristic vectors, obfuscation...
In 2013, the Qt Project announced a move away from Google's V8 JavaScript engine to their own internal V4 engine. Despite this, even today still contains interpretation layer and code in other parts of Qt. This paper aims investigate why decision change interpreters was made also evaluate aspects interpreted by what is V8. With this defined, differences secure coding techniques between these systems examined highlighted are important environment.