The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing has successfully enabled large scale computing to be offered as pay-as-you-go services to many enterprise and individual tenants. However, the trust on public cloud services has been a sensitive issue for both cloud tenants and cloud service providers (CSPs). Tenants tend to worry about losing the total control over their codes and data hosted on remote servers. Public cloud providers...
Securing routing layer functions in mobile ad hoc networks is an important issue, which includes many challenges like how to enhance detection accuracy when facing the highly dynamic characteristic of such networks, and how to distinguish malicious accusations under a totally autonomous structure. In this paper, we propose Distributed Court System (DCS), a complete Intrusion Detection System that...
CAPTCHA is a test that can tell humans and computer programs apart automatically. The aim is to allow the server to identify the visitor is a human or a computer, and only provide services to human. It can improve the current server system and user information security. The static plane visual CAPTCHA based on OCR problems with the advantages of implementation and operation[1] become the mainstream...
In order to avoid tremendous attack from malicious computer programs, CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart) mechanism has been introduced to distinguish humans and computers. Due to the fast development of pattern recognition and artificial intelligence technology, there are increasing safety loopholes concerning traditional 2D static CAPTCHAs, resulting...
In this paper, we propose a novel intrusion detection (ID) method, distributed court system (DCS), that is applied on OLSR (optimized link state routing) protocol in mobile ad hoc networks (MANETs), to solve link spoofing in topology control (TC) messages. This system performs similar functions as a court in real-life. Network is organized into one-hop clusters, in which each node performs local monitoring,...
Generally, the security requirements analysis is a key process of security requirements engineering which includes the elicitation, analysis, verification and management of security requirements. Based on the existing security requirements analysis theories and approaches, this paper introduces two proposals to analysis the security requirements of information systems. The first proposal based on...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.