The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Together with the growth of Internet, e-commerce transactions play an important role in the modern society. As a result, phishing is a deliberate act by an individual or a group of people to steal personal information such as password, banking account, credit card information, etc. Most of these phishing web pages look similar to the real web pages in terms of website interface and uniform resource...
Phishing is an attempt by an individual or a group of person to steal personal information such as password, banking account and credit card information, etc. Most of these phishing web pages look similar to the real web pages in terms of website interface and uniform resource locator (URL) address. Many techniques have been proposed to detect phishing websites, such as Blacklist-based technique,...
Phishing is one of the luring techniques used by phishers in the intention of exploiting the personal information. Phishing website is a fake website that looks similar to legitimate site in terms of interface and uniform resource locator (URL) address. Therefore, the numbers of victim have been increasing due to inefficient methods using blacklist to detect phishing. This paper proposed a new technique...
Together with the growth of e-commerce transaction, Phishing - the act of stealing personal information - rises in quantity and quality. The phishers try to make fake-sites look similar to legitimate sites in terms of interface and uniform resource locator (URL) address. Therefore, the numbers of victim have been increasing due to inefficient methods using blacklist to detect phishing. This paper...
With the growth of Internet, e-commerce plays a vital role in the society. As a result, phishing, the act of stealing personal user data used in e-commerce transaction, has been becoming an emergency problem in modern society. Many techniques have been proposed to protect online users, e.g. blacklist, pagerank. However, the numbers of victims have been increasing due to inefficient protection technique...
In Cognitive Radio Networks (CRN), the appearance of more active primary users (PUs) might require blocking of one or more secondary user (SU) transmissions to maintain interference constraints at PU receivers and Quality of Service (QoS) constraints of SUs. In general, SU transmitters need to adjust their transmission powers to maintain these constraints at all times. In this paper, we are interested...
In Cognitive Radio Network, secondary users opportunistically use the licensed channels to transmit data. The secondary users first conduct the local sensing to determine the unoccupied channels and then choose the satisfied channel in the available channel set to transmit. However, the sensing results might not be accurate due to many problems: channel fading or shadowing, noise, hidden primary users...
In Cognitive Radio Networks (CRN), nodes can switch to different operating frequency bands and adapt their transmission power levels such that Cognitive Radio (CR) nodes transmissions remain transparent to the Primary Radios (PR). This constraint can be assured by keeping the aggregated interference caused by CR transmissions at PR nodes location below a defined threshold. In this paper, we propose:...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.