Skip Content
You are currently on the new version of our website. Access the old version .

Computers, Volume 9, Issue 3

2020 September - 22 articles

Cover Story: This article presents an experimental setup that passively collects DNS data from a network and then uses permissioned distributed ledger technology to store the data in an immutable ledger, thus providing a full historical overview of all records. The passive DNS data collection process creates a database containing various DNS data elements, some of which are personal and need to be protected to preserve the privacy of end-users. The proposed solution supports private queries for storing and retrieving data from the blockchain ledger, allowing use of the passive DNS database for further analysis, e.g., for the identification of malicious domain names. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (22)

  • Article
  • Open Access
3 Citations
4,037 Views
22 Pages

This paper investigates the effect that selected auditory distractions have on the signal of a visual P300 Speller in terms of accuracy, amplitude, latency, user preference, signal morphology, and overall signal quality. In addition, it ensues the de...

  • Article
  • Open Access
8 Citations
3,947 Views
19 Pages

This paper investigates the dynamics of information spread across social network services (SNSs) such as Twitter using the susceptible-infected-recovered (SIR) model. In the analysis, the non-responsiveness of individual users is taken into account;...

  • Article
  • Open Access
13 Citations
8,461 Views
16 Pages

Privacy-Preserving Passive DNS

  • Pavlos Papadopoulos,
  • Nikolaos Pitropakis,
  • William J. Buchanan,
  • Owen Lo and
  • Sokratis Katsikas

The Domain Name System (DNS) was created to resolve the IP addresses of web servers to easily remembered names. When it was initially created, security was not a major concern; nowadays, this lack of inherent security and trust has exposed the global...

  • Article
  • Open Access
2 Citations
3,754 Views
23 Pages

Addressing Bandwidth-Driven Flow Allocationin RINA

  • Michal Koutenský,
  • Vladimír Veselý and
  • Vincenzo Maffione

Effective capacity allocation is essential for a network to operate properly, providing predictable quality of service guarantees and avoiding bottlenecks. Achieving capacity allocation fairness is a long-standing problem extensively researched in th...

  • Article
  • Open Access
7 Citations
8,366 Views
11 Pages

A protection of information against electromagnetic penetration is very often considered in the aspect of the possibility of obtaining data contained in printed documents or displayed on screen monitors. However, many printing devices are equipped wi...

  • Article
  • Open Access
15 Citations
6,799 Views
12 Pages

Today, Knowledge Management (KM) is becoming a popular approach for improving organizational innovation, but whether encouraging knowledge sharing will lead to a better innovative working behaviour of employees is still a question. This study aims to...

  • Article
  • Open Access
29 Citations
6,809 Views
18 Pages

Predicting LoRaWAN Behavior: How Machine Learning Can Help

  • Francesca Cuomo,
  • Domenico Garlisi,
  • Alessio Martino and
  • Antonio Martino

Large scale deployments of Internet of Things (IoT) networks are becoming reality. From a technology perspective, a lot of information related to device parameters, channel states, network and application data are stored in databases and can be used...

  • Article
  • Open Access
2 Citations
5,053 Views
22 Pages

ARCFIRE: Experimentation with the Recursive InterNetwork Architecture

  • Sander Vrijders,
  • Dimitri Staessens,
  • Didier Colle,
  • Eduard Grasa,
  • Miquel Tarzan,
  • Sven van der Meer,
  • Marco Capitani,
  • Vincenzo Maffione,
  • Diego Lopez and
  • John Day
  • + 1 author

European funded research into the Recursive Inter-Network Architecture (RINA) started with IRATI, which developed an initial prototype implementation for OS/Linux. IRATI was quickly succeeded by the PRISTINE project, which developed different policie...

  • Article
  • Open Access
29 Citations
5,968 Views
14 Pages

An Adversarial Approach for Intrusion Detection Systems Using Jacobian Saliency Map Attacks (JSMA) Algorithm

  • Ayyaz Ul Haq Qureshi,
  • Hadi Larijani,
  • Mehdi Yousefi,
  • Ahsan Adeel and
  • Nhamoinesu Mtetwa

In today’s digital world, the information systems are revolutionizing the way we connect. As the people are trying to adopt and integrate intelligent systems into daily lives, the risks around cyberattacks on user-specific information have sign...

  • Article
  • Open Access
1 Citations
4,088 Views
16 Pages

Computer programmers require various instructive information during coding and development. Such information is dispersed in different sources like language documentation, wikis, and forums. As an information exchange platform, programmers broadly ut...

of 3

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431X