語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Using power-law properties of social...
~
Rice, Justin L.
FindBook
Google Book
Amazon
博客來
Using power-law properties of social groups for cloud defense and community detection.
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Using power-law properties of social groups for cloud defense and community detection./
作者:
Rice, Justin L.
面頁冊數:
99 p.
附註:
Source: Dissertation Abstracts International, Volume: 74-09(E), Section: B.
Contained By:
Dissertation Abstracts International74-09B(E).
標題:
Computer Science. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3570079
ISBN:
9781303095504
Using power-law properties of social groups for cloud defense and community detection.
Rice, Justin L.
Using power-law properties of social groups for cloud defense and community detection.
- 99 p.
Source: Dissertation Abstracts International, Volume: 74-09(E), Section: B.
Thesis (Ph.D.)--Louisiana Tech University, 2013.
The power-law distribution can be used to describe various aspects of social group behavior. For mussels, sociobiological research has shown that the Levy walk best describes their self-organizing movement strategy. A mussel's step length is drawn from a power-law distribution, and its direction is drawn from a uniform distribution. In the area of social networks, theories such as preferential attachment seek to explain why the degree distribution tends to be scale-free. The aim of this dissertation is to glean insight from these works to help solve problems in two domains: cloud computing systems and community detection.
ISBN: 9781303095504Subjects--Topical Terms:
626642
Computer Science.
Using power-law properties of social groups for cloud defense and community detection.
LDR
:03591nam a2200313 4500
001
1959370
005
20140520124010.5
008
150210s2013 ||||||||||||||||| ||eng d
020
$a
9781303095504
035
$a
(MiAaPQ)AAI3570079
035
$a
AAI3570079
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Rice, Justin L.
$3
2094767
245
1 0
$a
Using power-law properties of social groups for cloud defense and community detection.
300
$a
99 p.
500
$a
Source: Dissertation Abstracts International, Volume: 74-09(E), Section: B.
500
$a
Adviser: Vir V. Phoha.
502
$a
Thesis (Ph.D.)--Louisiana Tech University, 2013.
520
$a
The power-law distribution can be used to describe various aspects of social group behavior. For mussels, sociobiological research has shown that the Levy walk best describes their self-organizing movement strategy. A mussel's step length is drawn from a power-law distribution, and its direction is drawn from a uniform distribution. In the area of social networks, theories such as preferential attachment seek to explain why the degree distribution tends to be scale-free. The aim of this dissertation is to glean insight from these works to help solve problems in two domains: cloud computing systems and community detection.
520
$a
Privacy and security are two areas of concern for cloud systems. Recent research has provided evidence indicating how a malicious user could perform co-residence profiling and public to private IP mapping to target and exploit customers which share physical resources. This work proposes a defense strategy, in part inspired by mussel self-organization, that relies on user account and workload clustering to mitigate co-residence profiling. To obfuscate the public to private IP map, clusters are managed and accessed by account proxies. This work also describes a set of capabilities and attack paths an attacker needs to execute for targeted co-residence, and presents arguments to show how the defense strategy disrupts the critical steps in the attack path for most cases. Further, it performs a risk assessment to determine the likelihood an individual user will be victimized, given that a successful non-directed exploit has occurred. Results suggest that while possible, this event is highly unlikely.
520
$a
As for community detection, several algorithms have been proposed. Most of these, however, share similar disadvantages. Some algorithms require apriori information, such as threshold values or the desired number of communities, while others are computationally expensive. A third category of algorithms suffer from a combination of the two. This work proposes a greedy community detection heuristic which exploits the scale-free properties of social networks. It hypothesizes that highly connected nodes, or hubs, form the basic building blocks of communities. A detection technique that explores these characteristics remains largely unexplored throughout recent literature. To show its effectiveness, the algorithm is tested on commonly used real network data sets. In most cases, it classifies nodes into communities which coincide with their respective known structures. Unlike other implementations, the proposed heuristic is computationally inexpensive, deterministic, and does not require apriori information.
590
$a
School code: 0109.
650
4
$a
Computer Science.
$3
626642
650
4
$a
Engineering, Computer.
$3
1669061
650
4
$a
Psychology, Behavioral.
$3
1017677
690
$a
0984
690
$a
0464
690
$a
0384
710
2
$a
Louisiana Tech University.
$b
Computer Science and Engineering.
$3
2094768
773
0
$t
Dissertation Abstracts International
$g
74-09B(E).
790
$a
0109
791
$a
Ph.D.
792
$a
2013
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3570079
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9254198
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入