The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In smart cities, wireless multimedia sensor networks (WMSNs) and mobile cellular networks (MCNs) play an important role in surveillance and management of living environment, i.e., structural health of buildings, urban transportation, and potential locations of future crime, etc. In WMSNs, the camera sensors (CSs) can capture multimedia contents from particular areas, packetize and transmit them to...
In this paper, we study the secrecy performance of a half-duplex cognitive relay network in the presence of multiple eavesdroppers and multiple primary users. In particular, generic $K$ th best relay selection schemes for opportunistic relay selection (ORS) and partial relay selection (PRS) are proposed. Exact closed-form and asymptotic expressions for secrecy outage probability (SOP) of the considered...
The Internet has brought enormous benefits to mankind, but it could be many potential risks. Internet crimes are growing rapidly, phishing is one of the new type of online crime. Phishing site is a fake-site aimed to steal personal information such as password, banking account and credit card information, etc. Most of these phishing pages look similar to the real pages in terms of interface and uniform...
The explosive growth of Internet commerce has made phishers who may attempt to create phishing sites aimed to steal personal information such as password, banking account and credit card account details, etc. Most of these phishing pages look similar to the real pages in terms of interface and uniform resource locator (URL) address. Many techniques have been proposed to identify phishing sites. However,...
Together with the growth of Internet, e-commerce transactions play an important role in the modern society. As a result, phishing is a deliberate act by an individual or a group of people to steal personal information such as password, banking account, credit card information, etc. Most of these phishing web pages look similar to the real web pages in terms of website interface and uniform resource...
Phishing is an attempt by an individual or a group of person to steal personal information such as password, banking account and credit card information, etc. Most of these phishing web pages look similar to the real web pages in terms of website interface and uniform resource locator (URL) address. Many techniques have been proposed to detect phishing websites, such as Blacklist-based technique,...
Phishing is one of the luring techniques used by phishers in the intention of exploiting the personal information. Phishing website is a fake website that looks similar to legitimate site in terms of interface and uniform resource locator (URL) address. Therefore, the numbers of victim have been increasing due to inefficient methods using blacklist to detect phishing. This paper proposed a new technique...
Together with the growth of e-commerce transaction, Phishing - the act of stealing personal information - rises in quantity and quality. The phishers try to make fake-sites look similar to legitimate sites in terms of interface and uniform resource locator (URL) address. Therefore, the numbers of victim have been increasing due to inefficient methods using blacklist to detect phishing. This paper...
In this paper, the performance of underlay cognitive dual-hop decode-and-forward (DF) multi-relay networks with best relay selection (BRS) over independent identically distributed (i.i.d.) Weibull fading channels is evaluated. The maximum transmit power of the secondary network is governed by the maximum interference power that the primary networks' receiver can tolerate. Specifically the closed-form...
In this paper, the performance of dual-hop decode-and-forward (DF) cognitive relay networks over independent non-identically distributed (i.n.i.d.) Weibull fading channels are evaluated, in a spectrum sharing environment. Where the transmit power of the secondary network is governed by the maximum interference power that the primary networks' receiver can tolerate. The closed form outage probability...
With the growth of Internet, e-commerce plays a vital role in the society. As a result, phishing, the act of stealing personal user data used in e-commerce transaction, has been becoming an emergency problem in modern society. Many techniques have been proposed to protect online users, e.g. blacklist, pagerank. However, the numbers of victims have been increasing due to inefficient protection technique...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.