The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Computer worms pose a real threat to the Internet security, and their automatic nature makes them powerful and destructive. In this paper we propose fast and accurate detection system for Zero-day polymorphic worms. We have designed a novel double-honeynet system, which is able to detect new worms that have not been seen before. We apply Principal Component Analysis (PCA) to reduce the dimension of...
Playlists are a concept commonly known from music players. Building on the concept of mix tapes they enable the user to select and group their favorite music and thereby creating new compilations of music. Web video portals have adopted this idea to let users create custom combinations of videos. This paper will focus on the task of adding playlist functionality in an E-Learning context. We describe...
Most reported literature of e-government systems tend to focus on narrow aspect of project design and implementation. The social aspects of evaluation and related issues such as organizational learning issues are yet to be discovered. This paper presents issues of system evaluation in one of e-government project; e-procurement. Using a case study approach of e-procurement project in Malaysia government,...
Real data is pervaded with uncertainty. As a consequence, the development and adaptation of automatic knowledge acquisition techniques under uncertainty is entirely advisable. Among them fuzzy sets theory formulizes and analyses the situations in which the uncertainty is due to the vague (fuzzy) data. Any good decision is based on information. Data Warehousing and Knowledge Discovery technology is...
Most of the attacks on networks are launched through spoofed IP addresses i.e. Denial of Service attack. Attacker spoofs IP address of legitimate client, sends many useless packets to the victim and acts as a legitimate user. Since the attacks are launched through spoofed IP addresses therefore it is very difficult to identify the source of the attack (Attacker). The researchers introduce a technique...
In this paper, multi-path optimization using genetic algorithm (GA) and rainbow network flow (RNF) for maximizing the received multiple description coding (MDCs) in a lossy network model is proposed. The network flow of multiple description codes (MDCs) is considered and the idea of routing as finding paths for a rainbow of colours (rainbow network flow or RNF) incorporated. The GA is used to find...
Governance has become one of the most important aspects of IT. IT governance is a must for any organization seeking to keep an eye on its investments. The move to e-commerce environment represents an opportunity as well as a threat. Airline industry has been heavily affected by this move. This paper discusses the role of IT governance in e-commerce environment by presenting three cases from airline...
Conventional routing schemes that aim to provide better routing performance in order to offer better Quality of Service (QoS) may not be effective especially for time sensitive data delivery across the wireless section of the network. Wireless transmission has unique characteristics that need to be addressed and taken into account when come to path selection. Using the right routing metric for performance...
The multimedia enriched transport supported by the Internet today continues to pose a challenge to engineers who attempt to provide QoS for its users. The popular method of using Diffserv solutions is typically too static to meet the mixed user traffic model. This paper introduces a novel user-centric approach of dynamically evaluating and policing incoming Internet flows to control the ratio of traffic...
This paper presents a simple, efficient and extendable solution for content extraction from web 2.0. Web 2.0 is perceived as the second generation of the web technologies. Web 2.0 has undoubtedly made significant impact in enriching the end-user experience and allowing programmers to write more interactive desktop-like applications for the web. However, it has also introduced some new issues for researchers...
Sentiment Classification is an important and hot current research area. This extended abstract of our work observes the effect of some machine learning algorithms like Naïve Bayes, SVM and their variants on the movie review data. We have used a novel and hybrid feature selection/reduction technique which is minimizing the number of features exponentially. The results show that with our feature selection...
Whilst SAML-based federations are most often used by academic and semi-commercial institutions that focus only on attribute-based authentication, we foresee a growing interest for service providers providing charged services. Since more and more academic and semi-commercial federation participants offer Voice-over-IP (VoIP) services, this type of service provides an entry point into identity federation...
Web content plays an important role in the contemporary information economy. Even though web content is used to generate advertising revenues for authors, and serves as an important reference and knowledge discovery resource for readers, proving original authorship and preventing plagiarism are not easy on the Internet. This paper presents the design and analysis of an automatic cryptography based...
Malicious botnets threaten the Internet by DDoS-attacks, spam, information theft and other criminal activities. They are using increasingly sophisticated techniques to hide the Command and Control traffic. Many existing detection techniques can be defeated by encryption, tunneling in popular protocols, delays, and flow perturbation. We introduce a new DNS-based detection approach, that detects botnet...
In a Wireless Sensor Networks (WSN), nodes observe their environment and forward the sensed data to a sink. Security of the sensor nodes and the sensed data in transit is vital for such networks. Cryptographic techniques can be employed to achieve confidentiality, integrity and other security needs of the network. However, due to resource constraints existing cryptographic mechanisms that need large...
SCADA systems run silently in the background of our power generation plants, manufacturing facilities, and many other critical infrastructure resources. Even though these SCADA systems are critical in nature, the IT community often poorly understands them. As a result, security of SCADA systems has been neglected, even though companies have improved their security posture to meet regulatory demands...
Trusted Computing, used as a security technology, can establish trust between multiple parties. One implementation of Trusted Computing Technology standardized by the Trusted Computing Group is the Trusted Platform Module (TPM). We build on the security provided by the TPM to create a trusted variant of Identity Management Systems based on the popular OpenID protocol. We show that it is feasible to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.