Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 2 of 2
  • Item
    Cleaning and sentiment tasks for news transcript data
    (Springer Verlag service@springer.de, 2017) Lakshman, V.; Ananth, S.; Chhanchan, R.; Chandrasekaran, K.
    Today, vast amount of news in various forms is hosted on the web. They include news articles, digital newspapers, news clips, podcasts, and other sources. Traditionally, news articles and writings have been used to carry out sentiment analysis for topics. However, news channels and their transcripts represent vast data that have not been examined for business aspects. In this light, we have charted out a methodology to gather transcripts and process them for sentiment tasks by building a system to crawl Webpages for documents, index them, and aggregate them for topic analysis. Vector space model has been used for document indexing with predetermined set of topics and sentiment analysis carried out through the SentiWordNet data set, a lexical resource used for opinion mining. The areas of insight are mainly the polarity index (degree of polarity or subjectivity) of the news presented as well as their coverage. This research shows insights that can used by businesses to assess the content and quality of their content. © Springer Science+Business Media Singapore 2017.
  • Item
    Game theoretic modeling of gray hole attacks in wireless ad hoc networks
    (Springer Verlag service@springer.de, 2017) Ketankumar, C.K.; Sankaranarayanan, S.; Lakshman, V.; Chandrasekaran, K.
    Wireless ad hoc networks rely on the cooperation of participating nodes to undertake activities such as routing. Malicious nodes participating in the network may refuse to forward packets and instead discard them to mount a denial-of-service attack called a packet drop or blackhole attack. Blackhole attacks can however be easily detected using common networking tools like trace route as all packets passing through the malicious node is dropped. A gray hole attack on the other hand accomplishes denial of service by selectively dropping packets thus escaping detection. In this paper, a novel two player incomplete information extensive form game is used to model the defender and the attacker both of whom are considered rational agents in an effort to determine their optimal (equilibrium) strategies under different values for the parameters true detection rate, false alarm rate, packet value, packets forwarded per unit time, probability of the node being a gray hole, cost of exposure of the attacker and cost of not using a node for the defender. The respective equilibrium strategies if followed guarantee maximum possible protection for the defender and maximal possible damage potential for the attacker. © Springer India 2017.