scispace - formally typeset
Search or ask a question
JournalISSN: 2192-1962

Human-centric Computing and Information Sciences 

SpringerOpen
About: Human-centric Computing and Information Sciences is an academic journal published by SpringerOpen. The journal publishes majorly in the area(s): Usability & Mobile device. It has an ISSN identifier of 2192-1962. Over the lifetime, 359 publications have been published receiving 7706 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: A systematic and detailed survey of the malware detection mechanisms using data mining techniques and classifies the malware Detection approaches in two main categories including signature-based methods and behavior-based detection.
Abstract: Data mining techniques have been concentrated for malware detection in the recent decade. The battle between security analyzers and malware scholars is everlasting as innovation grows. The proposed methodologies are not adequate while evolutionary and complex nature of malware is changing quickly and therefore turn out to be harder to recognize. This paper presents a systematic and detailed survey of the malware detection mechanisms using data mining techniques. In addition, it classifies the malware detection approaches in two main categories including signature-based methods and behavior-based detection. The main contributions of this paper are: (1) providing a summary of the current challenges related to the malware detection approaches in data mining, (2) presenting a systematic and categorized overview of the current approaches to machine learning mechanisms, (3) exploring the structure of the significant methods in the malware detection approach and (4) discussing the important factors of classification malware approaches in the data mining. The detection approaches have been compared with each other according to their importance factors. The advantages and disadvantages of them were discussed in terms of data mining models, their evaluation method and their proficiency. This survey helps researchers to have a general comprehension of the malware detection field and for specialists to do consequent examinations.

272 citations

Journal ArticleDOI
TL;DR: This paper surveys the existing solutions of the black hole attack, discusses the state-of-the-art routing methods, and analyzes the categories of these solutions to provide a comparison table.
Abstract: The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders utilize the loophole to carry out their malicious behaviors because the route discovery process is necessary and inevitable. Many researchers have conducted different detection techniques to propose different types of detection schemes. In this paper, we survey the existing solutions and discuss the state-of-the-art routing methods. We not only classify these proposals into single black hole attack and collaborative black hole attack but also analyze the categories of these solutions and provide a comparison table. We expect to furnish more researchers with a detailed work in anticipation.

261 citations

Journal ArticleDOI
TL;DR: The aim of the article is to make aware the Computer Science community of this new development, the differences with previous dominant paradigms and the opportunities that this area offers to the scientific community and society.
Abstract: We explain basic features of an emerging area called Intelligent Environments. We give a short overview on how it has developed, what is the current state of the art and what are the challenges laying ahead. The aim of the article is to make aware the Computer Science community of this new development, the differences with previous dominant paradigms and the opportunities that this area offers to the scientific community and society.

237 citations

Journal ArticleDOI
TL;DR: An algorithm is proposed to effectively detect deliberate spread of false information which would enable users to make informed decisions while spreading information in social networks and uses the collaborative filtering property of social networks to measure the credibility of sources of information as well as quality of news items.
Abstract: The paper explores the use of concepts in cognitive psychology to evaluate the spread of misinformation, disinformation and propaganda in online social networks. Analysing online social networks to identify metrics to infer cues of deception will enable us to measure diffusion of misinformation. The cognitive process involved in the decision to spread information involves answering four main questions viz consistency of message, coherency of message, credibility of source and general acceptability of message. We have used the cues of deception to analyse these questions to obtain solutions for preventing the spread of misinformation. We have proposed an algorithm to effectively detect deliberate spread of false information which would enable users to make informed decisions while spreading information in social networks. The computationally efficient algorithm uses the collaborative filtering property of social networks to measure the credibility of sources of information as well as quality of news items. The validation of the proposed methodology has been done on the online social network `Twitter’.

185 citations

Journal ArticleDOI
TL;DR: The simulation clarifies the effectiveness of the proposed PSO approach over its comparatives in terms of network lifetime, average packet transmissions, cluster head selection rounds supported by PSO and average energy consumption.
Abstract: The wireless sensor networks have long been an attractive field to the researchers and scientists for its ease in deployment and maintenance. In this research, we focus on the maximization of network lifetime which has become a critical issue in sensor networks. Clustered organization of nodes with aggregation of data at the cluster head becomes one of the significant means to extend life expectancy of the network. This paper proposes Particle Swarm Optimization (PSO) approach for generating energy-aware clusters by optimal selection of cluster heads. The PSO eventually reduces the cost of locating optimal position for the head nodes in a cluster. In addition, we have implemented the PSO-based approach within the cluster rather than base station, which makes it a semi-distributed method. The selection criteria of the objective function are based on the residual energy, intra-cluster distance, node degree and head count of the probable cluster heads. Furthermore, influence of the expected number of packet retransmissions along the estimated path towards the cluster head is also reflected in our proposed energy consumption model. The performance evaluation of our proposed technique is carried out with respect to the well-known cluster-based sensor network protocols, LEACH-C and PSO-C respectively. Finally, the simulation clarifies the effectiveness of our proposed work over its comparatives in terms of network lifetime, average packet transmissions, cluster head selection rounds supported by PSO and average energy consumption.

183 citations

Network Information
Related Journals (5)
Multimedia Tools and Applications
16K papers, 185.7K citations
85% related
Journal of Network and Computer Applications
2.9K papers, 119.9K citations
84% related
Future Generation Computer Systems
6.6K papers, 246.8K citations
82% related
The Journal of Supercomputing
6.1K papers, 74.6K citations
81% related
Procedia Computer Science
19.6K papers, 228.8K citations
80% related
Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
20213
202053
201944
201838
201742
201624