The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we introduce a new phishing detection method, which is based on the analysis of legitimate website server log information. The idea is based on finding the references. Because of the references, every time the victim opens phishing website, the phishing website will refer to the legitimate website by asking for resources. Then, there is a log, which is recorded by the legal website...
Wikipedia, one of the largest online encyclopedias, is competent to Britannica. Articles are subject to day to day changes by authors, and each such change is recorded as a new revision. In this paper, we visualize the article's revisions and build the semantic network between articles. First, we analyze the revisions difference of article and using color to show the revisions change. Second, through...
Recommender system is one of the most effective technologies to deal with information overload, which has been used in a lot of business systems. Historically, many recommender systems take much focus on prediction accuracy. However, despite their pretty accuracy, they may not be useful to users. A user's preference is full of uncertainty, including randomness and fuzziness. Unfortunately, a fixed...
Music is ubiquitous in our daily life. People actively or passively listen to music at different locations and consciously or non-consciously experience it as a form of emotion expression. In this paper, we present a new location and emotion aware web-base interactive music system. It aims to provide the user preferred music with location and emotion awareness. The system starts recommendation with...
A traditional CRM stores all information about its customers in a database and uses this data to coordinate sales, marketing, and customer service. Obviously, this exclusive data is not enough and has less credibility for today's business transactions. As the internet grows very fast, we can obtain more information from the internet. In this paper, we propose a novel scheme that enables the exclusive...
It is widely accepted that botnets pose one of the most significant threats to the Internet. But the size of the botnet continues to be an issue of debate among the research community. We develop new techniques to measure botnet size by using traces of emails from HUST Mail Server. In this trace, we have successfully identied the size of botnets through URL and collaborative mail servers. Our research...
As the largest botnet on the Internet, the storm worm peer-to-peer botnet partly parasitizes on current overnet peer-to-peer networks. Therefore, distinguishing storm bots from regular peers is of great meaning. In this paper we propose a novel method for identifying storm bots using an active crawler that can collect location information from all participants. Due to the flaws in the generation algorithm...
In the past 40 years, software development methodology has made significant contribution to the software engineering. What is more, the booming of Internet brought new challenges to software development. To coping with the changes of application background and personalized requirements, this paper presents an agile development methodology of service-oriented personalized software from a research perspective...
The booming of Internet has brought new challenges to software engineering. In the network age, software industry has undergone a transition from manufacturing industry to the service trade, software doesnpsilat have clear hierarchy structure, specific life cycle and definite system border any longer. On the contrary, both software itself and the environment it works in are all networked. In this...
For meeting the requirement that Web application system can quickly go into service, quick response, and rapid adapt the change of Web application system, this paper proposes a new Web development method: Agile Web Development with Web Framework (AWDWF). This paper present AWDWF through researching the characteristic of Web Framework, Agile Web development process, as well as their integration. Furthermore...
With widespread use of the Internet, data is often shared between organizations in B2B networks. Knowledge discovery that integrates data across all sources in a B2B network would be useful to provide a complete view of how the overall network is performing in meeting the needs of consumers. To enable this, business agreements must be in place as well as consumer consent and access controls to ensure...
E-health networks can provide integrated services to patients and health care workers that are more broadly accessible by leveraging Internet technology and electronic health records. However, issues of security and privacy must be addressed. In particular, compliance with relevant privacy legislation must be established. Federated identity management can enable users and service providers to securely...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.