The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It has been recognized that current phishing filters in existence today are steadily lacking in effectiveness. Furthermore, users and organizations are lacking appropriate security policies and education, which has led to massive reports of data and privacy breaches in organizations. To address this issue, a phishing filter is proposed which will build upon and broaden the scope of existing techniques...
“Big data” is a term that is widely used by large corporations today. With access to a vast infrastructure and a large collection of personal information that is not publicly available, the United States of America (US) is able to complete researches and projects that are out of the reach of most countries and corporations. This paper will examine three US companies that have successfully utilized...
In this paper, the development of a driver deployment and communication system for a food delivery service company is discussed. The client company seeks to improve its infrastructure by implementing new system over its existing system that utilizes traditional communication methods. By using various cloud-based server technologies, we were able to deliver a system that fulfilled all the requirements...
Under most circumstances, cyber criminals will commit fraudulent transactions using proxy services which hide their real IP address and physical location. This is done in an effort to avoid being tracked and prosecuted by law enforcement agencies. This paper presents the investigation of a proxy detection methodology and efforts to implement such technology into a business solution with the sole purpose...
The telecommunications industry uses a combination of 2G (GSM), 3G (UMTS) and 4G (LTE) systems to access communication worldwide. Concurrent with a recent rise in cyber-attacks, the requirement for a secure infrastructure is increasingly crucial. However, while each new standard offers better protection to the mobile users, currently 84% of households in the UK have access to 3G signal from the four...
This paper outlines an innovative software development that utilises Quality of Service (QoS) and parallel technologies in Cisco Catalyst Switches to increase the analytical performance of a Network Intrusion Detection and Protection System (NIDPS) when deployed in high-speed networks. We have designed a real network to present experiments that use a Snort NIDPS. Our experiments demonstrate the weaknesses...
With the various and increasingly malicious attacks on networks and wireless systems, traditional security tools such as anti-virus programs and firewalls are not sufficient to provide free, integrated, reliable and secure networks. Intrusion detection systems (IDSs) are one of the most tested and reliable technologies to monitor incoming and outgoing network traffic to identify unauthorized usage...
One of the main challenges in search engine quality of service is how to satisfy the needs and the interests of individual users. This raises the fundamental issue of how to identify and select the information that is relevant to a specific user. This concern over generic provision and the lack of search precision have provided the impetus for the research into Web Search personalisation. In this...
This paper is concerned with the issue of low quality of web search results and ways of improving it. Information sources are exponentially increasing on the web and are making it increasingly difficult to get relevant information. The quality of web search results depends on two factors: the information needs of the users and the searching techniques. In order to improve the quality of search results...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.