The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Developing software applications that are free of vulnerabilities is a necessity, especially if these applications are intended to operate over the World Wide Web. As the development of software applications is evolving in a quick manner the need to develop tools that can automatically detect vulnerabilities in a software has emerged. The main challenge in these tools is providing a high accuracy...
With the dramatic increase in the number of software security problems, a growing body of research in how to integrate security within software development is notable. Many security approaches have appeared to solve security problems by applying a set of activities through Software Development Life Cycle (SDLC). Among the top approaches are McGraw's Touchpoints, Comprehensive Lightweight Application...
In the context of Online Social Networks, Spam profiles are not just a source of unwanted ads, but a serious security threat used by online criminals and terrorists for various malicious purposes. Recently, such criminals were able to steal a number of accounts that belong to NatWest bank's customers. Their attack vector was based on spam tweets posted by a Twitter account which looked very close...
The growth in technology usage came along with many risks and increase in cybercrimes incidents. Phishing attacks are a form of cybercrimes by which attackers trick victims in order to obtain personal and sensitive information. Phishers motivations include gaining unauthorized information and access, cause financial loss and many more negative impacts. While cybercriminals keep developing their techniques,...
The nature of today's online communication and the emergence of online social networks have introduced a great challenge related to the identification and the verification of users in web environments. The assumption that every user interact uniquely with a web site provides a baseline for studying user identification based on historical records of user's interactions with specific web site. In this...
The cheapest form of communication in the world today is email, and its simplicity makes it vulnerable to many threats. One of the most important threats to email is spam, unsolicited email, normally with an advertising content sent out as a mass mailing. Malicious spam is spam with malicious content in forms of harmful attachments or links to phishing websites. In the case of educational institutes,...
In this study we investigate malicious spam emails in the context of educational institutes. The goal of the study is two folds, first, is to explore spam types of attacks and what their malicious contents may include and secondly, to analyze if these attacks exhibit discriminative characteristics. This study offers an empirical analysis of spam emails dataset and provides a rich set of features that...
Service integration is one of the most critical issues affecting e-government implementations in Jordan and all over the world. Providing integrated services to citizens, businesses, and all other stakeholders involved in e-government at "one stop portal" is considered to be a big opportunity for governments to improve their services' efficiency and effectiveness. This paper aims to provide...
Dynamic environments pose a challenge for traditional access control models where permissions are granted or revoked merely based on predefined and static access policies making them incapable of dynamically adapting to changing conditions. Risk adaptive access control models have been gaining more attention in the research community as an alternative approach to overcome the limitations of traditional...
One of the most accurate biometric authentication methods is iris pattern. It has the advantages of being stable, contactless and no user's previous knowledge is required. This paper presents an iris recognition system for user authentication. To design the proposed iris authentication system we reviewed and evaluated four iris pattern recognition features including Histogram of Oriented Gradients...
Krill Herd is a new optimization technique that was inspired by the herding behavior of real small crustaceans called Krills. The method was developed for continuous optimization problems and has recently been successfully applied to different complex problems. Feedforward neural network has a number of characteristics which make it suitable for solving complex classification problems. The training...
Human Computer Interaction systems have access to the valuable resource of information that can be collected directly from users of these systems and services. This idea has become a part of the design process for systems that touch users' perceptions — here, in the field of online advertising and marketing. This research paper discusses a revisited design for an adaptive online advertisement system...
Radio Frequency Identification (RFID) is one of the most popular Automatic Identification and Data Capture (AIDC) technologies that facilitate objects identification and information exchange over relatively small and widely separated entities. In this paper, the main aim is to address the privacy and security challenges that RFID Access Control Systems face and solve these challenges without relying...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.