ABSTRACT: With the advent of the internet, different online attacks have been expanded and among them the most popular attack is phishing. Phishing is an attempt by an individual or a group to get individual classified data, for example, passwords, Credit card data from unsuspecting victims to identifying theft, financial gain, and other fraudulent activities. Fake […]
.NET MINI PROJECTS
.NET Project On Enforcing Secure And Privacy-Preserving Information Brokering In Distributed Information Sharing
ABSTRACT: Today’s organizations raise an expanding requirement for information sharing by means of on-demand access. Information brokering systems (IBS) have been proposed to associate large scale loosely federated data sources via a brokering overlay, in which the representatives settle on routing decisions to guide customer queries to the requesting data servers. Many existing IBSs expect […]
.NET Project On Automatic Detection Of Paroxysms In Eeg Signals Using Morphological Descriptors And artificial Neural Networks
ABSTRACT: The electroencephalogram (EEG) signal plays an important role in the diagnosis of epilepsy. The EEG recordings of the ambulatory recording system produce very lengthy information and the detection of the epileptic activity requires a time-consuming examination of the entire length of the EEG information by an expert. The traditional strategies for the investigation being […]
.NET Project On Passive IP Traceback Disclosing the Locations of IP Spoofers From Path
ABSTRACT: It has long known aggressors may utilize forged source IP address to conceal their real locations. To capture the spoofers, various IP traceback components have been proposed. Be that as it may, because of the challenges of deployment, there has been not a widely adopted IP traceback solution, at any rate at the Internet […]
.NET Project On Robust Correlation Of Encrypted Attack Traffic through Stepping Stones By Flow Watermarking
ABSTRACT: Network-based intruders seldom attack their victims directly from their own computer. Often, they stage their attacks through intermediate “stepping stones” in order to conceal their identity and origin. To distinguish the source of the attack behind the stepping stone(s), it is important to associate the incoming and outgoing flows or connections of a stepping […]
.NET Project On Resource Allocation for QoS Support in Wireless Mesh Network
ABSTRACT: Many next-generation applications, (for example, video flows) are likely going to have related minimum data rate requirements in order to ensure satisfactory quality as perceived by end-users. In this project, we develop a system to address the issue of maximizing the aggregate utility of traffic flows in a multi-hop wireless network, with constrains imposed both […]
.NET Project On Beyond Text QA: Multimedia Answer Generation by Harvesting Web Information.
ABSTRACT: Community Question Answering (CQA) services have gained popularity over the past years. It not just enables community members to post and answer the question but also enables general clients to seek for data from a comprehensive set of well-answered question. In any case, existing cQA forums generally give only textual answers, which are not informative […]
.NET Project On Dynamic Personalized Recommendation on Sparse Data
ABSTRACT: Recommendation techniques are very important in the fields of E-commerce and other Web-based services. One of the main difficulties is dynamically providing the high-quality recommendation on sparse data. In this project, a novel dynamic personalized recommendation algorithm is proposed, in which information contained in both ratings and profile contents are utilized by exploring latent […]
.NET Project On A Log-based Approach to Make Digital Forensics Easier on Cloud Computing
ABSTRACT: Cloud computing is getting more and more attention from the data and communication technology industry recently. Almost all the leading organizations of the data area demonstrate their interesting and efforts in cloud computing and discharge services about cloud computing in succession. Be that as it may, if need to make it go further, we […]