The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the widespread deployment and usage of 802.11-based wireless local area networks (WLANs), Wi-Fi users are vulnerable to be attacked by a security threat called evil twins. The evil twin, a kind of rogue access points (RAPs), masquerades as a legitimate access point (AP) to lure users to connect it. Malicious adversaries can easily configure evil twins on a laptop to induce victim wireless users...
To continue the groundwater monitoring networks in the plain areas for further demand of clean water resources, the groundwater exploration of mountainous regions becomes a crucial issue in Taiwan. In this study, 75 boreholes were drilled for conducting investigation by the integration of subsurface exploration technologies, including drilling, core inspection, geophysical logging, and hydraulic testing...
Guiding young learners' attention improves their self-directed learning skills, and that attention can be analyzed via the learners' eye movements. Thus, we propose a self-directed learning system integrating eye trackers with a web based interface to provide an attention guiding function that aims at notifying the learners about the ignored or the skipped parts from the learning material as well...
During service-based systems (SBS) development, the qualities of service (QoS) are significant factors to compose high-quality workflows and the QoS claimed by service providers may be not trustworthy enough. In this paper, a reputation system supervising both service providers and service clients without much monitoring cost is introduced. The approach is based on the claimed QoS deviation from the...
SQL injection attacks, a class of injection flaw in which specially crafted input strings leads to illegal queries to databases, are one of the topmost threats to web applications. A number of research prototypes and commercial products that maintain the queries structure in web applications have been developed. But these techniques either fail to address the full scope of the problem or have limitations...
In this study, artificial antigens for Bensulfuron-methyl (BSM) were prepared by means of two-step procedure of glutaraldehyde method. The hapten BSM was covalently attached to ovalbumin to synthesis immunogen (BSM-OVA), and hapten Benzyl sulfonamide (BS) was linked to BSA to prepare coating antigen (BS-BSA). The conjugates were identified by UV spectrophotometry and SDS-PAGE. After immunized with...
Outlier detection over data streams has attracted attention for many emerging applications, such as network intrusion detection, web click stream and aircraft health anomaly detection. Since the data stream is likely to change over time, it is important to be able to modify the outlier detection model appropriately with the evolution of the stream. Most existing approaches were using incremental or...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.