The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Since fall 2012, several National Centers of Academic Excellence in Cyber Defense Research have fielded a collaborative course—the Information Security Research and Education (INSuRE) program—to engage students in applied cybersecurity research. Recent experiences with INSuRE are discussed, including an overview of the project-based research course, student projects, and outcomes and lessons learned.
Phishing attacks are a well known problem in our age of electronic communication. Sensitive information like credit card details, login credentials for account, etc. are targeted by phishers. Emails are the most common channel for launching phishing attacks. They are made to resemble genuine ones as much as possible to fool recipients into divulging private and sensitive data, causing huge monetary...
At the 2015 Workshop on Security and Privacy Analytics, there was a well-attended and vigorous debate on educating and training professionals and students in security analytics. This article extends this debate by laying out essential security analytics concepts for professionals and students, sharing educational experiences, and identifying gaps in the field.
Video of classroom lectures is a valuable and increasingly popular learning resource. A major weakness of the video format is the inability to quickly access the content of interest. The goal of this work is to automatically partition a lecture video into topical segments which are then presented to the user in a customized video player. The approach taken in this work is to identify topics based...
It is our pleasure to welcome you to the Proceedings of the IEEE Workshop on Security and Privacy of Mobile, Wireless and Sensor Networks (MWSN). Several people have volunteered their time and effort generously to ensure the success of this workshop. Our thanks go to all the members of the organizing committee for handling the logistics, and to the members of the technical program committee and the...
PID controllers have been the mainstay of many process control systems. The conventional electronic PID controllers have generally been implemented using the traditional voltage mode operational amplifiers. The present communication presents a new fully differential current mode PID controller which has been realized using dual output current conveyors. Simulation results in PSPICE showing the workability...
Phishing causes billions of dollars in damage every year and poses a serious threat to the Internet economy. Among the many possible communication channels, electronic mail still remains the most commonly used medium to launch phishing attacks. In this paper, we present a two dimensional approach to detecting phishing emails. We devise two independent, unsupervised classifiers, namely the link and...
In this paper the relationship of a buyer-supplier is studied so as to determine the potential supplier. Analytical Hierarchy Process technique is used to rank the suppliers. Decision makers at a service firm supplying products and processes to the steel industry worldwide, through an empirical study help identify factors that affect supplier selection procedure. Critical parameters for supplier evaluation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.