Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In smart cities, wireless multimedia sensor networks (WMSNs) and mobile cellular networks (MCNs) play an important role in surveillance and management of living environment, i.e., structural health of buildings, urban transportation, and potential locations of future crime, etc. In WMSNs, the camera sensors (CSs) can capture multimedia contents from particular areas, packetize and transmit them to...
In this paper, we study the secrecy performance of a half-duplex cognitive relay network in the presence of multiple eavesdroppers and multiple primary users. In particular, generic $K$ th best relay selection schemes for opportunistic relay selection (ORS) and partial relay selection (PRS) are proposed. Exact closed-form and asymptotic expressions for secrecy outage probability (SOP) of the considered...
The Internet has brought enormous benefits to mankind, but it could be many potential risks. Internet crimes are growing rapidly, phishing is one of the new type of online crime. Phishing site is a fake-site aimed to steal personal information such as password, banking account and credit card information, etc. Most of these phishing pages look similar to the real pages in terms of interface and uniform...
The explosive growth of Internet commerce has made phishers who may attempt to create phishing sites aimed to steal personal information such as password, banking account and credit card account details, etc. Most of these phishing pages look similar to the real pages in terms of interface and uniform resource locator (URL) address. Many techniques have been proposed to identify phishing sites. However,...
Together with the growth of Internet, e-commerce transactions play an important role in the modern society. As a result, phishing is a deliberate act by an individual or a group of people to steal personal information such as password, banking account, credit card information, etc. Most of these phishing web pages look similar to the real web pages in terms of website interface and uniform resource...
Phishing is an attempt by an individual or a group of person to steal personal information such as password, banking account and credit card information, etc. Most of these phishing web pages look similar to the real web pages in terms of website interface and uniform resource locator (URL) address. Many techniques have been proposed to detect phishing websites, such as Blacklist-based technique,...
Phishing is one of the luring techniques used by phishers in the intention of exploiting the personal information. Phishing website is a fake website that looks similar to legitimate site in terms of interface and uniform resource locator (URL) address. Therefore, the numbers of victim have been increasing due to inefficient methods using blacklist to detect phishing. This paper proposed a new technique...
Together with the growth of e-commerce transaction, Phishing - the act of stealing personal information - rises in quantity and quality. The phishers try to make fake-sites look similar to legitimate sites in terms of interface and uniform resource locator (URL) address. Therefore, the numbers of victim have been increasing due to inefficient methods using blacklist to detect phishing. This paper...
In this paper, the performance of underlay cognitive dual-hop decode-and-forward (DF) multi-relay networks with best relay selection (BRS) over independent identically distributed (i.i.d.) Weibull fading channels is evaluated. The maximum transmit power of the secondary network is governed by the maximum interference power that the primary networks' receiver can tolerate. Specifically the closed-form...
In this paper, the performance of dual-hop decode-and-forward (DF) cognitive relay networks over independent non-identically distributed (i.n.i.d.) Weibull fading channels are evaluated, in a spectrum sharing environment. Where the transmit power of the secondary network is governed by the maximum interference power that the primary networks' receiver can tolerate. The closed form outage probability...
With the growth of Internet, e-commerce plays a vital role in the society. As a result, phishing, the act of stealing personal user data used in e-commerce transaction, has been becoming an emergency problem in modern society. Many techniques have been proposed to protect online users, e.g. blacklist, pagerank. However, the numbers of victims have been increasing due to inefficient protection technique...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.