The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Android is the most preferable target for malware attacks due to its increased popularity amongst other operating systems for Smartphone devices. Owing to its open architecture and large user base, it provides the developers with an open access to its code base and a large surface area to launch their malicious activities. This paper presents an approach to perform dynamic analysis of android applications...
People are highly dependent on online social networks (OSNs) which have attracted the interest of cyber criminals for carrying out a number of malicious activities. An entire industry of black-market services has emerged which offers fake accounts based services for sale. We, therefore, in our work, focus on detecting fake accounts on a very popular (and difficult for data collection) online social...
YouTube draws large number of users who contribute actively by uploading videos or commenting on existing videos. However, being a crowd sourced and large content pushed onto it, there is limited control over the content. This makes malicious users push content (videos and comments) which is inappropriate (unsafe), particularly when such content is placed around cartoon videos which are typically...
A decade earlier, work on modeling and analyzing social network, was primarily focused on manually collected dataseis where the friendship links were sparse but relatively noise free (i.e. all links represented strong physical relation). With the popularity of online social networks, the notion of “friendship” changed dramatically. The data collection, now although automated, contains dense friendship...
Online Social Media (OSM) in general and more specifically micro-blogging site Twitter has outpaced the conventional news dissemination systems. It is often observed that news stories are first broken in Twitter space and then the electronic and print media take them up. However, the distributed structure and lack of moderation in Twitter compounded with the temptation of posting a news worthy story...
Lately, there has been a growing trend in the Internet space particularly among the Online Social Media (OSMs) platforms like Twitter, Facebook etc which are becoming huge repositories of information. This information, by design, is posted by users of these websites and consequently, this information is vast, un-organized, unreliable and dynamic. It is commonly observed that along with genuine users,...
Computer Programming as a process that embodies the creation of an executable computer program for a given computational problem by analyzing the task and developing an algorithm that computes the desired result. Due to its complex and diverse nature, programming requires a certain level of expertise in analysis of algorithms, data structures, mathematics, formal logic as well as related tasks such...
Who is an authoritative author in a particular field is a common question that every learner or researcher wants to know. The widely available scholarly work from authors in different fields is typically indexed on various platforms like Google Scholar, DBLP, etc. Each platform uses various ranking algorithms to evaluate reputation of work based on the criteria of relevance, time and citation counts...
Spam is an unsolicited message, usually sent in thebulk. It is an unwanted activity that is performed to deceivepeople, to theft their personal information, to inject virus in theirsystem, to redirect them on malicious sites. On OSN, spammersshare malicious link looking like genuine one, place discountmessages on their wall, develop malicious apps and sometimescreate fake accounts. While on blog sites,...
BotNet is a network based attack that has emerged as a serious threat to Internet community and has been a common weapon for committing cybercrimes such as spam generation, stealing sensitive information, click fraud and DDOS attacks. Botnet is a network of hosts remotely controlled and coordinated under a common command and control infrastructure. P2P BotNets represent a recent and most challenging...
Network administrators ensure that all the users within network get fair share of bandwidth, any bandwidth limit violations is identified and provide some additional controls like denied access to particular websites, etc. To achieve this, network administrators monitor all the traffic between the LAN in campus-wide network and the outside Internet world. This monitoring is typically achieved by capturing...
Twitter is fast becoming the most popular platform for spread of information in general and pertaining to political views in particular. Like any other social networking site, Twitter is a medium to socialize with people and particularly in political space, it is pertinent to gauge the public opinion from time to time. One of the key requirements is to find people with similar political opinions in...
Online social media websites like Twitter has become one of the most popular platforms for people to obtain or spread information. However, in absence of any moderation and use of crowd sourcing, there is no guarantee that the information shared is credible or not. This makes online social media highly susceptible to the spread of rumors. As part of our work, we investigate in retrospect a dataset...
Online Social Networks (OSNs) are deemed to be the most sought-after societal tool used by the masses world over to communicate and transmit information. Our dependence on these platforms for seeking opinions, news, updates, etc. is increasing. While it is true that OSNs have become a new medium for dissemination of information, at the same time, they are also fast becoming a playground for the spread...
BitTorrent is one of the most popular peer to peer (P2P) protocols used for downloading large sized files over internet. Success of BitTorrent relies heavily upon the peers contributing to the protocol by uploading the partially (or fully) downloaded files to other peers. However, it is matter of common observation that very often a peer is found only downloading large files and not allowing uploading...
BitTorrent protocol has been quite successful in capturing majority of Internet traffic since its inception due to its various mechanisms to improve the download performance of the network. The mechanisms like tit-for-tat, optimistic unchoking, anti-snubbing and various piece selection strategy, etc. have been working very well. This work is an attempt to study the performance of BitTorrent protocol...
This paper presents the design and implementation of a system of automatic evaluation of programming assignments at an undergraduate level. Evaluation is done primarily from two standpoints - plagiarism detection and program testing. Proposed algorithm for plagiarism detection detects all the most common forms of plagiarism done by students. Program testing is performed by subjecting the submitted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.