SlideShare a Scribd company logo
Knowledge and Data Engineering IEEE 2015 Projects
Web : www.kasanpro.com Email : sales@kasanpro.com
List Link : http://kasanpro.com/projects-list/knowledge-and-data-engineering-ieee-2015-projects
Title :Malware Propagation in Large-Scale Networks
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/malware-propagation-large-scale-networks
Abstract : Malware is pervasive in networks, and poses a critical threat to network security. However, we have very
limited understanding of malware behavior in networks to date. In this paper, we investigate how malware propagate
in networks from a global perspective. We formulate the problem, and establish a rigorous two layer epidemic model
for malware propagation from network to network. Based on the proposed model, our analysis indicates that the
distribution of a given malware follows exponential distribution, power law distribution with a short exponential tail, and
power law distribution at its early, late and final stages, respectively. Extensive experiments have been performed
through two real-world global scale malware data sets, and the results confirm our theoretical findings.
Title :Discovery of Ranking Fraud for Mobile Apps
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/ranking-fraud-discovery-mobile-apps
Abstract : Ranking fraud in the mobile App market refers to fraudulent or deceptive activities which have a purpose of
bumping up the Apps in the popularity list. Indeed, it becomes more and more frequent for App developers to use
shady means, such as inflating their Apps' sales or posting phony App ratings, to commit ranking fraud. While the
importance of preventing ranking fraud has been widely recognized, there is limited understanding and research in
this area. To this end, in this paper, we provide a holistic view of ranking fraud and propose a ranking fraud detection
system for mobile Apps. Specifically, we first propose to accurately locate the ranking fraud by mining the active
periods, namely leading sessions, of mobile Apps. Such leading sessions can be leveraged for detecting the local
anomaly instead of global anomaly of App rankings. Furthermore, we investigate three types of evidences, i.e.,
ranking based evidences, rating based evidences and review based evidences, by modeling Apps' ranking, rating and
review behaviors through statistical hypotheses tests. In addition, we propose an optimization based aggregation
method to integrate all the evidences for fraud detection. Finally, we evaluate the proposed system with real-world
App data collected from the iOS App Store for a long time period. In the experiments, we validate the effectiveness of
the proposed system, and show the scalability of the detection algorithm as well as some regularity of ranking fraud
activities.
Title :Towards Effective Bug Triage with Software Data Reduction Techniques
Language : Java
Project Link : http://kasanpro.com/p/java/bug-triage-software-data-reduction-techniques
Abstract : Software companies spend over 45 percent of cost in dealing with software bugs. An inevitable step of
fixing bugs is bug triage, which aims to correctly assign a developer to a new bug. To decrease the time cost in
manual work, text classification techniques are applied to conduct automatic bug triage. In this paper, we address the
problemof data reduction for bug triage, i.e., how to reduce the scale and improve the quality of bug data.We combine
instance selection with feature selection to simultaneously reduce data scale on the bug dimension and the word
dimension. To determine the order of applying instance selection and feature selection, we extract attributes from
historical bug data sets and build a predictive model for a new bug data set. We empirically investigate the
performance of data reduction on totally 600,000 bug reports of two large open source projects, namely Eclipse and
Mozilla. The results show that our data reduction can effectively reduce the data scale and improve the accuracy of
bug triage. Our work provides an approach to leveraging techniques on data processing to form reduced and
high-quality bug data in software development and maintenance.
Title :Towards Effective Bug Triage with Software Data Reduction Techniques
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/effective-bug-triage-software-data-reduction-techniques
Abstract : Software companies spend over 45 percent of cost in dealing with software bugs. An inevitable step of
fixing bugs is bug triage, which aims to correctly assign a developer to a new bug. To decrease the time cost in
manual work, text classification techniques are applied to conduct automatic bug triage. In this paper, we address the
problemof data reduction for bug triage, i.e., how to reduce the scale and improve the quality of bug data.We combine
instance selection with feature selection to simultaneously reduce data scale on the bug dimension and the word
dimension. To determine the order of applying instance selection and feature selection, we extract attributes from
historical bug data sets and build a predictive model for a new bug data set. We empirically investigate the
performance of data reduction on totally 600,000 bug reports of two large open source projects, namely Eclipse and
Mozilla. The results show that our data reduction can effectively reduce the data scale and improve the accuracy of
bug triage. Our work provides an approach to leveraging techniques on data processing to form reduced and
high-quality bug data in software development and maintenance.

More Related Content

What's hot (16)

PPSX
Reverse Engineering android Malware analysis
Anik Ralhan
 
PDF
Bug Triage: An Automated Process
IRJET Journal
 
PDF
Towards Effective Bug Triage with Software Data Reduction Techniques
1crore projects
 
DOCX
Nikhil CV
Nikhil Sharma
 
PDF
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET Journal
 
PDF
A Survey on Bug Tracking System for Effective Bug Clearance
IRJET Journal
 
PPTX
L injection toward effective collaborative filtering using uninteresting items
Kumar Dlk
 
PDF
Generation of Search Based Test Data on Acceptability Testing Principle
iosrjce
 
PPT
Simseer - A Software Similarity Web Service
Silvio Cesare
 
PDF
178 - A replicated study on duplicate detection: Using Apache Lucene to searc...
ESEM 2014
 
PPT
Producing Quality Software
Simon Smith
 
PDF
Software Defect Trend Forecasting In Open Source Projects using A Univariate ...
CSCJournals
 
PDF
An Efficient Approach for Requirement Traceability Integrated With Software ...
International Journal of Engineering Inventions www.ijeijournal.com
 
PPTX
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
Chamila Wijayarathna
 
PDF
An Efficient Approach for Requirement Traceability Integrated With Software R...
IOSR Journals
 
PDF
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
csandit
 
Reverse Engineering android Malware analysis
Anik Ralhan
 
Bug Triage: An Automated Process
IRJET Journal
 
Towards Effective Bug Triage with Software Data Reduction Techniques
1crore projects
 
Nikhil CV
Nikhil Sharma
 
IRJET- Data Reduction in Bug Triage using Supervised Machine Learning
IRJET Journal
 
A Survey on Bug Tracking System for Effective Bug Clearance
IRJET Journal
 
L injection toward effective collaborative filtering using uninteresting items
Kumar Dlk
 
Generation of Search Based Test Data on Acceptability Testing Principle
iosrjce
 
Simseer - A Software Similarity Web Service
Silvio Cesare
 
178 - A replicated study on duplicate detection: Using Apache Lucene to searc...
ESEM 2014
 
Producing Quality Software
Simon Smith
 
Software Defect Trend Forecasting In Open Source Projects using A Univariate ...
CSCJournals
 
An Efficient Approach for Requirement Traceability Integrated With Software ...
International Journal of Engineering Inventions www.ijeijournal.com
 
Using Cognitive Dimensions Questionnaire to Evaluate the Usability of Securit...
Chamila Wijayarathna
 
An Efficient Approach for Requirement Traceability Integrated With Software R...
IOSR Journals
 
DROIDSWAN: Detecting Malicious Android Applications Based on Static Feature A...
csandit
 

Viewers also liked (13)

PPSX
Feliz
Helena Martins
 
PPTX
Vendée
Aurélie Stauder
 
PPTX
Aakash Group Residential Project Echo Point Bhimrad Surat
Settlers India.com
 
PDF
Role of IP in Biotech
Shruti Kaushik
 
PPSX
Happy
Helena Martins
 
PPTX
sri anandamayimaa | Siranandamayimaa ashram
srianandamayimaa
 
PPTX
Frame rate powerpoint
mapuk7
 
PPTX
Screen ratios powerpoint
mapuk7
 
PPTX
Resolution powerpoint
mapuk7
 
PPTX
Compression powerpoint
mapuk7
 
PDF
Integracja środowiska testowego z użyciem Robot Framework, TrojQA 2014-12-16
Krzysztof Synak
 
PPTX
Halogen
Gracius Y. Muskita
 
PPTX
Wholesale shipping cartons
Jeffrey White
 
Aakash Group Residential Project Echo Point Bhimrad Surat
Settlers India.com
 
Role of IP in Biotech
Shruti Kaushik
 
sri anandamayimaa | Siranandamayimaa ashram
srianandamayimaa
 
Frame rate powerpoint
mapuk7
 
Screen ratios powerpoint
mapuk7
 
Resolution powerpoint
mapuk7
 
Compression powerpoint
mapuk7
 
Integracja środowiska testowego z użyciem Robot Framework, TrojQA 2014-12-16
Krzysztof Synak
 
Wholesale shipping cartons
Jeffrey White
 
Ad

Similar to Knowledge and Data Engineering IEEE 2015 Projects (20)

PDF
J034057065
ijceronline
 
PDF
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
tsysglobalsolutions
 
PDF
Reliability Improvement with PSP of Web-Based Software Applications
CSEIJJournal
 
PDF
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION
IJNSA Journal
 
PDF
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION
IJNSA Journal
 
PDF
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Editor IJCATR
 
PDF
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
SBGC
 
PDF
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
IOSR Journals
 
PDF
IEEE 2015 C# Projects
Vijay Karan
 
PDF
Unit Testing Essay
Dani Cox
 
PDF
A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...
IJCI JOURNAL
 
PDF
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUES
ijaia
 
PDF
IEEE 2015 C# Projects
Vijay Karan
 
PDF
web security
Myprivateresearcher.com
 
PDF
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET Journal
 
PPTX
datgjigikbvyuoiskjblh;kgjhcgxjchvklb;n'jmkjl;ljvkcjgch m,./.l]kpi0u9-y08t7r65...
andirajukeshavakrish
 
PDF
We are excited to announce that our new State of Software Security (SOSS) rep...
Ampliz
 
PDF
The State of Software Security 2022 SOSS - Solution
NeelKamalSingh8
 
PDF
CRIME EXPLORATION AND FORECAST
IRJET Journal
 
J034057065
ijceronline
 
IEEE ANDROID APPLICATION 2016 TITLE AND ABSTRACT
tsysglobalsolutions
 
Reliability Improvement with PSP of Web-Based Software Applications
CSEIJJournal
 
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION
IJNSA Journal
 
MAPREDUCE IMPLEMENTATION FOR MALICIOUS WEBSITES CLASSIFICATION
IJNSA Journal
 
Software Defect Prediction Using Radial Basis and Probabilistic Neural Networks
Editor IJCATR
 
2012 ieee projects software engineering @ Seabirds ( Trichy, Chennai, Pondich...
SBGC
 
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
IOSR Journals
 
IEEE 2015 C# Projects
Vijay Karan
 
Unit Testing Essay
Dani Cox
 
A NOVEL APPROACH TO ERROR DETECTION AND CORRECTION OF C PROGRAMS USING MACHIN...
IJCI JOURNAL
 
TOWARDS PREDICTING SOFTWARE DEFECTS WITH CLUSTERING TECHNIQUES
ijaia
 
IEEE 2015 C# Projects
Vijay Karan
 
IRJET - Survey on Malware Detection using Deep Learning Methods
IRJET Journal
 
datgjigikbvyuoiskjblh;kgjhcgxjchvklb;n'jmkjl;ljvkcjgch m,./.l]kpi0u9-y08t7r65...
andirajukeshavakrish
 
We are excited to announce that our new State of Software Security (SOSS) rep...
Ampliz
 
The State of Software Security 2022 SOSS - Solution
NeelKamalSingh8
 
CRIME EXPLORATION AND FORECAST
IRJET Journal
 
Ad

More from Vijay Karan (20)

PDF
IEEE 2014 Java Projects
Vijay Karan
 
PDF
IEEE 2015 Java Projects
Vijay Karan
 
PDF
IEEE 2014 NS2 Projects
Vijay Karan
 
PDF
IEEE 2015 NS2 Projects
Vijay Karan
 
PDF
IEEE 2014 Matlab Projects
Vijay Karan
 
PDF
IEEE 2015 Matlab Projects
Vijay Karan
 
PDF
IEEE 2014 C# Projects
Vijay Karan
 
PDF
IEEE 2014 ASP.NET with C# Projects
Vijay Karan
 
PDF
IEEE 2014 ASP.NET with VB Projects
Vijay Karan
 
PDF
M.E Computer Science Medical Imaging Projects
Vijay Karan
 
PDF
M.Phil Computer Science Server Computing Projects
Vijay Karan
 
PDF
M.E Computer Science Server Computing Projects
Vijay Karan
 
PDF
M.Phil Computer Science Remote Sensing Projects
Vijay Karan
 
PDF
M.E Computer Science Remote Sensing Projects
Vijay Karan
 
PDF
M.Phil Computer Science Wireless Communication Projects
Vijay Karan
 
PDF
M.E Computer Science Wireless Communication Projects
Vijay Karan
 
PDF
M.Phil Computer Science Parallel and Distributed System Projects
Vijay Karan
 
PDF
M.E Computer Science Parallel and Distributed System Projects
Vijay Karan
 
PDF
M.Phil Computer Science Networking Projects
Vijay Karan
 
PDF
M.Phil Computer Science Biometric System Projects
Vijay Karan
 
IEEE 2014 Java Projects
Vijay Karan
 
IEEE 2015 Java Projects
Vijay Karan
 
IEEE 2014 NS2 Projects
Vijay Karan
 
IEEE 2015 NS2 Projects
Vijay Karan
 
IEEE 2014 Matlab Projects
Vijay Karan
 
IEEE 2015 Matlab Projects
Vijay Karan
 
IEEE 2014 C# Projects
Vijay Karan
 
IEEE 2014 ASP.NET with C# Projects
Vijay Karan
 
IEEE 2014 ASP.NET with VB Projects
Vijay Karan
 
M.E Computer Science Medical Imaging Projects
Vijay Karan
 
M.Phil Computer Science Server Computing Projects
Vijay Karan
 
M.E Computer Science Server Computing Projects
Vijay Karan
 
M.Phil Computer Science Remote Sensing Projects
Vijay Karan
 
M.E Computer Science Remote Sensing Projects
Vijay Karan
 
M.Phil Computer Science Wireless Communication Projects
Vijay Karan
 
M.E Computer Science Wireless Communication Projects
Vijay Karan
 
M.Phil Computer Science Parallel and Distributed System Projects
Vijay Karan
 
M.E Computer Science Parallel and Distributed System Projects
Vijay Karan
 
M.Phil Computer Science Networking Projects
Vijay Karan
 
M.Phil Computer Science Biometric System Projects
Vijay Karan
 

Recently uploaded (20)

PPTX
PLANNING FOR EMERGENCY AND DISASTER MANAGEMENT ppt.pptx
PRADEEP ABOTHU
 
PPTX
week 1-2.pptx yueojerjdeiwmwjsweuwikwswiewjrwiwkw
rebznelz
 
PPTX
Lesson 1 Cell (Structures, Functions, and Theory).pptx
marvinnbustamante1
 
PPTX
How to Configure Taxes in Company Currency in Odoo 18 Accounting
Celine George
 
PPTX
Natural Language processing using nltk.pptx
Ramakrishna Reddy Bijjam
 
PDF
Lesson 1 : Science and the Art of Geography Ecosystem
marvinnbustamante1
 
PPTX
Aerobic and Anaerobic respiration and CPR.pptx
Olivier Rochester
 
PPTX
How to Add a Custom Button in Odoo 18 POS Screen
Celine George
 
PPTX
Connecting Linear and Angular Quantities in Human Movement.pptx
AngeliqueTolentinoDe
 
PPTX
The Gift of the Magi by O Henry-A Story of True Love, Sacrifice, and Selfless...
Beena E S
 
PPT
21st Century Literature from the Philippines and the World QUARTER 1/ MODULE ...
isaacmendoza76
 
PDF
The Power of Compound Interest (Stanford Initiative for Financial Decision-Ma...
Stanford IFDM
 
PDF
Genomics Proteomics and Vaccines 1st Edition Guido Grandi (Editor)
kboqcyuw976
 
PDF
CAD25 Gbadago and Fafa Presentation Revised-Aston Business School, UK.pdf
Kweku Zurek
 
PDF
COM and NET Component Services 1st Edition Juval Löwy
kboqcyuw976
 
PDF
Cooperative wireless communications 1st Edition Yan Zhang
jsphyftmkb123
 
PDF
Wikinomics How Mass Collaboration Changes Everything Don Tapscott
wcsqyzf5909
 
PDF
Supply Chain Security A Comprehensive Approach 1st Edition Arthur G. Arway
rxgnika452
 
PDF
Lesson 1 - Nature of Inquiry and Research.pdf
marvinnbustamante1
 
PDF
Public Health For The 21st Century 1st Edition Judy Orme Jane Powell
trjnesjnqg7801
 
PLANNING FOR EMERGENCY AND DISASTER MANAGEMENT ppt.pptx
PRADEEP ABOTHU
 
week 1-2.pptx yueojerjdeiwmwjsweuwikwswiewjrwiwkw
rebznelz
 
Lesson 1 Cell (Structures, Functions, and Theory).pptx
marvinnbustamante1
 
How to Configure Taxes in Company Currency in Odoo 18 Accounting
Celine George
 
Natural Language processing using nltk.pptx
Ramakrishna Reddy Bijjam
 
Lesson 1 : Science and the Art of Geography Ecosystem
marvinnbustamante1
 
Aerobic and Anaerobic respiration and CPR.pptx
Olivier Rochester
 
How to Add a Custom Button in Odoo 18 POS Screen
Celine George
 
Connecting Linear and Angular Quantities in Human Movement.pptx
AngeliqueTolentinoDe
 
The Gift of the Magi by O Henry-A Story of True Love, Sacrifice, and Selfless...
Beena E S
 
21st Century Literature from the Philippines and the World QUARTER 1/ MODULE ...
isaacmendoza76
 
The Power of Compound Interest (Stanford Initiative for Financial Decision-Ma...
Stanford IFDM
 
Genomics Proteomics and Vaccines 1st Edition Guido Grandi (Editor)
kboqcyuw976
 
CAD25 Gbadago and Fafa Presentation Revised-Aston Business School, UK.pdf
Kweku Zurek
 
COM and NET Component Services 1st Edition Juval Löwy
kboqcyuw976
 
Cooperative wireless communications 1st Edition Yan Zhang
jsphyftmkb123
 
Wikinomics How Mass Collaboration Changes Everything Don Tapscott
wcsqyzf5909
 
Supply Chain Security A Comprehensive Approach 1st Edition Arthur G. Arway
rxgnika452
 
Lesson 1 - Nature of Inquiry and Research.pdf
marvinnbustamante1
 
Public Health For The 21st Century 1st Edition Judy Orme Jane Powell
trjnesjnqg7801
 

Knowledge and Data Engineering IEEE 2015 Projects

  • 1. Knowledge and Data Engineering IEEE 2015 Projects Web : www.kasanpro.com Email : [email protected] List Link : http://kasanpro.com/projects-list/knowledge-and-data-engineering-ieee-2015-projects Title :Malware Propagation in Large-Scale Networks Language : C# Project Link : http://kasanpro.com/p/c-sharp/malware-propagation-large-scale-networks Abstract : Malware is pervasive in networks, and poses a critical threat to network security. However, we have very limited understanding of malware behavior in networks to date. In this paper, we investigate how malware propagate in networks from a global perspective. We formulate the problem, and establish a rigorous two layer epidemic model for malware propagation from network to network. Based on the proposed model, our analysis indicates that the distribution of a given malware follows exponential distribution, power law distribution with a short exponential tail, and power law distribution at its early, late and final stages, respectively. Extensive experiments have been performed through two real-world global scale malware data sets, and the results confirm our theoretical findings. Title :Discovery of Ranking Fraud for Mobile Apps Language : C# Project Link : http://kasanpro.com/p/c-sharp/ranking-fraud-discovery-mobile-apps Abstract : Ranking fraud in the mobile App market refers to fraudulent or deceptive activities which have a purpose of bumping up the Apps in the popularity list. Indeed, it becomes more and more frequent for App developers to use shady means, such as inflating their Apps' sales or posting phony App ratings, to commit ranking fraud. While the importance of preventing ranking fraud has been widely recognized, there is limited understanding and research in this area. To this end, in this paper, we provide a holistic view of ranking fraud and propose a ranking fraud detection system for mobile Apps. Specifically, we first propose to accurately locate the ranking fraud by mining the active periods, namely leading sessions, of mobile Apps. Such leading sessions can be leveraged for detecting the local anomaly instead of global anomaly of App rankings. Furthermore, we investigate three types of evidences, i.e., ranking based evidences, rating based evidences and review based evidences, by modeling Apps' ranking, rating and review behaviors through statistical hypotheses tests. In addition, we propose an optimization based aggregation method to integrate all the evidences for fraud detection. Finally, we evaluate the proposed system with real-world App data collected from the iOS App Store for a long time period. In the experiments, we validate the effectiveness of the proposed system, and show the scalability of the detection algorithm as well as some regularity of ranking fraud activities. Title :Towards Effective Bug Triage with Software Data Reduction Techniques Language : Java Project Link : http://kasanpro.com/p/java/bug-triage-software-data-reduction-techniques Abstract : Software companies spend over 45 percent of cost in dealing with software bugs. An inevitable step of fixing bugs is bug triage, which aims to correctly assign a developer to a new bug. To decrease the time cost in manual work, text classification techniques are applied to conduct automatic bug triage. In this paper, we address the problemof data reduction for bug triage, i.e., how to reduce the scale and improve the quality of bug data.We combine instance selection with feature selection to simultaneously reduce data scale on the bug dimension and the word dimension. To determine the order of applying instance selection and feature selection, we extract attributes from historical bug data sets and build a predictive model for a new bug data set. We empirically investigate the performance of data reduction on totally 600,000 bug reports of two large open source projects, namely Eclipse and Mozilla. The results show that our data reduction can effectively reduce the data scale and improve the accuracy of bug triage. Our work provides an approach to leveraging techniques on data processing to form reduced and high-quality bug data in software development and maintenance. Title :Towards Effective Bug Triage with Software Data Reduction Techniques Language : C#
  • 2. Project Link : http://kasanpro.com/p/c-sharp/effective-bug-triage-software-data-reduction-techniques Abstract : Software companies spend over 45 percent of cost in dealing with software bugs. An inevitable step of fixing bugs is bug triage, which aims to correctly assign a developer to a new bug. To decrease the time cost in manual work, text classification techniques are applied to conduct automatic bug triage. In this paper, we address the problemof data reduction for bug triage, i.e., how to reduce the scale and improve the quality of bug data.We combine instance selection with feature selection to simultaneously reduce data scale on the bug dimension and the word dimension. To determine the order of applying instance selection and feature selection, we extract attributes from historical bug data sets and build a predictive model for a new bug data set. We empirically investigate the performance of data reduction on totally 600,000 bug reports of two large open source projects, namely Eclipse and Mozilla. The results show that our data reduction can effectively reduce the data scale and improve the accuracy of bug triage. Our work provides an approach to leveraging techniques on data processing to form reduced and high-quality bug data in software development and maintenance.