Skip Content
You are currently on the new version of our website. Access the old version .

Computers, Volume 9, Issue 3

2020 September - 22 articles

Cover Story: This article presents an experimental setup that passively collects DNS data from a network and then uses permissioned distributed ledger technology to store the data in an immutable ledger, thus providing a full historical overview of all records. The passive DNS data collection process creates a database containing various DNS data elements, some of which are personal and need to be protected to preserve the privacy of end-users. The proposed solution supports private queries for storing and retrieving data from the blockchain ledger, allowing use of the passive DNS database for further analysis, e.g., for the identification of malicious domain names. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (22)

  • Article
  • Open Access
17 Citations
6,404 Views
28 Pages

Fog Computing for Realizing Smart Neighborhoods in Smart Grids

  • Rituka Jaiswal,
  • Reggie Davidrajuh and
  • Chunming Rong

21 September 2020

Cloud Computing provides on-demand computing services like software, networking, storage, analytics, and intelligence over the Internet (“the cloud”). But it is facing challenges because of the explosion of the Internet of Things (IoT) devices and th...

  • Article
  • Open Access
24 Citations
7,633 Views
15 Pages

19 September 2020

Currently, unmanned aerial vehicles, such as drones, are becoming a part of our lives and extend to many areas of society, including the industrialized world. A common alternative for controlling the movements and actions of the drone is through unwi...

  • Article
  • Open Access
58 Citations
12,491 Views
17 Pages

Toward a Sustainable Cybersecurity Ecosystem

  • Shahrin Sadik,
  • Mohiuddin Ahmed,
  • Leslie F. Sikos and
  • A. K. M. Najmul Islam

17 September 2020

Cybersecurity issues constitute a key concern of today’s technology-based economies. Cybersecurity has become a core need for providing a sustainable and safe society to online users in cyberspace. Considering the rapid increase of technologica...

  • Article
  • Open Access
4 Citations
4,715 Views
17 Pages

11 September 2020

A general problem in large cities is mobility. Every day, there are incidents (accidents, construction, or meteorological events) that increase the duration of the journeys in a city and exert negative effects on the lives of citizens. A particular c...

  • Article
  • Open Access
73 Citations
10,935 Views
9 Pages

5 September 2020

Brain–computer interfaces (BCIs) can help people with limited motor abilities to interact with their environment without external assistance. A major challenge in electroencephalogram (EEG)-based BCI development and research is the cross-subjec...

  • Article
  • Open Access
6 Citations
3,664 Views
19 Pages

3 September 2020

The aerospace and defense industry is facing an end-of-life production issue with legacy embedded uniprocessor systems. Most, if not all, embedded processor manufacturers have already moved towards system-on-a-chip multicore architectures. Current sc...

  • Article
  • Open Access
6 Citations
6,007 Views
20 Pages

A P4-Enabled RINA Interior Router for Software-Defined Data Centers

  • Carolina Fernández,
  • Sergio Giménez,
  • Eduard Grasa and
  • Steve Bunch

2 September 2020

The lack of high-performance RINA (Recursive InterNetwork Architecture) implementations to date makes it hard to experiment with RINA as an underlay networking fabric solution for different types of networks, and to assess RINA’s benefits in pr...

  • Article
  • Open Access
4 Citations
5,306 Views
15 Pages

An Oracle-Based On-Chain Privacy

  • Yu-Jen Chen,
  • Ja-Ling Wu,
  • Yung-Chen Hsieh and
  • Chih-Wen Hsueh

In this work, we demonstrate how the blockchain and the off-chain storage interact via Oracle-based mechanisms, which build an effective connection between a distributed database and real assets. For demonstration purposes, smart contracts were drawn...

  • Article
  • Open Access
8 Citations
5,172 Views
21 Pages

Experimental Study for Determining the Parameters Required for Detecting ECG and EEG Related Diseases during the Timed-Up and Go Test

  • Vasco Ponciano,
  • Ivan Miguel Pires,
  • Fernando Reinaldo Ribeiro,
  • María Vanessa Villasana,
  • Maria Canavarro Teixeira and
  • Eftim Zdravevski

The use of smartphones, coupled with different sensors, makes it an attractive solution for measuring different physical and physiological features, allowing for the monitoring of various parameters and even identifying some diseases. The BITalino de...

  • Article
  • Open Access
3 Citations
4,044 Views
22 Pages

This paper investigates the effect that selected auditory distractions have on the signal of a visual P300 Speller in terms of accuracy, amplitude, latency, user preference, signal morphology, and overall signal quality. In addition, it ensues the de...

  • Article
  • Open Access
58 Citations
30,626 Views
13 Pages

An Efficient Secure Electronic Payment System for E-Commerce

  • Md Arif Hassan,
  • Zarina Shukur and
  • Mohammad Kamrul Hasan

E-commerce implies an electronic purchasing and marketing process online by using typical Web browsers. As e-commerce is quickly developing on the planet, particularly in recent years, many areas of life are affected, particularly the improvement in...

  • Article
  • Open Access
8 Citations
3,952 Views
19 Pages

This paper investigates the dynamics of information spread across social network services (SNSs) such as Twitter using the susceptible-infected-recovered (SIR) model. In the analysis, the non-responsiveness of individual users is taken into account;...

  • Article
  • Open Access
13 Citations
8,477 Views
16 Pages

Privacy-Preserving Passive DNS

  • Pavlos Papadopoulos,
  • Nikolaos Pitropakis,
  • William J. Buchanan,
  • Owen Lo and
  • Sokratis Katsikas

The Domain Name System (DNS) was created to resolve the IP addresses of web servers to easily remembered names. When it was initially created, security was not a major concern; nowadays, this lack of inherent security and trust has exposed the global...

  • Article
  • Open Access
2 Citations
3,761 Views
23 Pages

Addressing Bandwidth-Driven Flow Allocationin RINA

  • Michal Koutenský,
  • Vladimír Veselý and
  • Vincenzo Maffione

Effective capacity allocation is essential for a network to operate properly, providing predictable quality of service guarantees and avoiding bottlenecks. Achieving capacity allocation fairness is a long-standing problem extensively researched in th...

  • Article
  • Open Access
7 Citations
8,399 Views
11 Pages

A protection of information against electromagnetic penetration is very often considered in the aspect of the possibility of obtaining data contained in printed documents or displayed on screen monitors. However, many printing devices are equipped wi...

  • Article
  • Open Access
15 Citations
6,804 Views
12 Pages

Today, Knowledge Management (KM) is becoming a popular approach for improving organizational innovation, but whether encouraging knowledge sharing will lead to a better innovative working behaviour of employees is still a question. This study aims to...

  • Article
  • Open Access
29 Citations
6,820 Views
18 Pages

Predicting LoRaWAN Behavior: How Machine Learning Can Help

  • Francesca Cuomo,
  • Domenico Garlisi,
  • Alessio Martino and
  • Antonio Martino

Large scale deployments of Internet of Things (IoT) networks are becoming reality. From a technology perspective, a lot of information related to device parameters, channel states, network and application data are stored in databases and can be used...

  • Article
  • Open Access
2 Citations
5,058 Views
22 Pages

ARCFIRE: Experimentation with the Recursive InterNetwork Architecture

  • Sander Vrijders,
  • Dimitri Staessens,
  • Didier Colle,
  • Eduard Grasa,
  • Miquel Tarzan,
  • Sven van der Meer,
  • Marco Capitani,
  • Vincenzo Maffione,
  • Diego Lopez and
  • John Day
  • + 1 author

European funded research into the Recursive Inter-Network Architecture (RINA) started with IRATI, which developed an initial prototype implementation for OS/Linux. IRATI was quickly succeeded by the PRISTINE project, which developed different policie...

  • Article
  • Open Access
29 Citations
5,979 Views
14 Pages

An Adversarial Approach for Intrusion Detection Systems Using Jacobian Saliency Map Attacks (JSMA) Algorithm

  • Ayyaz Ul Haq Qureshi,
  • Hadi Larijani,
  • Mehdi Yousefi,
  • Ahsan Adeel and
  • Nhamoinesu Mtetwa

In today’s digital world, the information systems are revolutionizing the way we connect. As the people are trying to adopt and integrate intelligent systems into daily lives, the risks around cyberattacks on user-specific information have sign...

  • Article
  • Open Access
1 Citations
4,092 Views
16 Pages

Computer programmers require various instructive information during coding and development. Such information is dispersed in different sources like language documentation, wikis, and forums. As an information exchange platform, programmers broadly ut...

  • Article
  • Open Access
32 Citations
12,714 Views
29 Pages

Automatic Code Generation of MVC Web Applications

  • Gaetanino Paolone,
  • Martina Marinelli,
  • Romolo Paesani and
  • Paolino Di Felice

As Web applications become more and more complex, the development costs are increasing as well. A Model Driven Architecture (MDA) approach is proposed in this paper since it simplifies modeling, design, implementation, and integration of applications...

  • Article
  • Open Access
16 Citations
7,485 Views
14 Pages

Machine Learning Techniques with ECG and EEG Data: An Exploratory Study

  • Vasco Ponciano,
  • Ivan Miguel Pires,
  • Fernando Reinaldo Ribeiro,
  • Nuno M. Garcia,
  • María Vanessa Villasana,
  • Eftim Zdravevski and
  • Petre Lameski

Electrocardiography (ECG) and electroencephalography (EEG) are powerful tools in medicine for the analysis of various diseases. The emergence of affordable ECG and EEG sensors and ubiquitous mobile devices provides an opportunity to make such analysi...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431X