The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor networks (WSNs) have been deployed largely due to recent advances in wireless communication technologies. These sensors may be deployed in adverse or even hostile environments so they should consider security issues in their communications. In this paper we proposed sectorized location dependent key management (SLDK) based on Anjum's LDK algorithm in which generation of link securing...
Online social networks are communities of people who share common interests. These types of networks are used by millions of people around the world. The massive adoption of this service among users has made it a popular mean for malicious activities. The aim of this paper is to identify the parameters which are related to malware propagation in online social networks. To do this, we first construct...
Cross Site Scripting Worms, are malicious programs that propagates through visitors of a website in attempt to infect other visitors progressively. Cross site scripting vulnerabilities are exploited in many forms; one of the common forms is using worms on popular social websites, such as MySpace and Facebook. In this paper first we suggest a general model based on our discussions. Then we simulate...
Automated propagating malwares such as worms have drawn significant attention due to their adverse impact on Internet and network security. According to latest advisories, malware creation has reached epidemic proportions. While much research attention has been paid in developing stochastic models of worm propagation, the real world prevention mechanisms have not been deployed in simulations. Describing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.