Learn More
IP-spoofing attacks remain one of the most damaging attacks in which an attacker replaces the original source IP address with a new one. Using the existing attacking tools to launch IP spoofing attacks, an attacker can now easily compromise access routers and not only the end-hosts. In this paper, we propose a trust-based approach using a Bayesian inference(More)
The Unani System of Medicine also known as Greeko-Arab medicine, founded by Hippocrates is based on the concept of equilibrium and balance of natural body humours (blood, bile, black bile and phlegm). The imbalance in the quality and quantity of these humours leads to diseases whereas restoration of this balance maintains health of a person. The treatment(More)
Trust is important in Ad-hoc networks because collaboration and cooperation among nodes are critical towards achieving the system's goals, such as routing reliability. In this paper, we seek to provide an understanding of the process of reputation-based trust approaches and related issues as they apply to routing in ad-hoc networks. We discuss the concept(More)
While sharing information is the main purpose of online social networks (OSN), privacy is a major concern. It has been argued that the lack of privacy protection caused the massive departure of users from MySpace in 2008 [1] - specially, due to mass media coverage on dangers of teenagers' public profiles and the appearance of Facebook, which provided a more(More)
Recently, we have seen a rapid growth of social networking systems (SNSs). In most SNSs, a user can configure his privacy settings to indicate who can or cannot see his friend list. Usually, SNSs, such as LinkedIn and Google Plus, also include a feature that allows a user to query mutual friends between him and any other user he can reach using the(More)
Q&A social media have gained a lot of attention during the recent years. People rely on these sites to obtain information due to a number of advantages they offer as compared to conventional sources of knowledge (e.g., asynchronous and convenient access). However, for the same question one may find highly contradicting answers, causing an ambiguity with(More)
Location-Based Social Network Systems (LBSNSs) are becoming increasingly popular. In LBSNSs, users can check in at various places, connect with their friends and share their check-ins (including users' locations and timestamps) with their friends and even the public. However, most LBSNSs pay on more attention to attracting users to join and actively use(More)
Cloud technology can be used to support costeffective, scalable, and well-managed healthcare information systems. However, cloud computing, particularly multitenancy, introduces privacy and security issues related to personal health information (PHI). In this paper, we designed ontological models for healthcare workflow and multi-tenancy, and then applied(More)