The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
University students of science and engineering have to study in laboratories for graduation. Therefore, they are necessary to select the laboratories at a time when they become the 4th-grade. However, there are some problems in laboratory assignment. For example, there is a specialized mismatch problem of the students and the laboratories. In this study, we proposed a new laboratory assignment support...
DNS (Domain Name System) amplification attack has become a popular form of the attacks of the Distributed Denial of Service (DDoS) in recent years. In DNS amplification attacks, the attackers utilize spoofed source IP addresses and open recursive DNS servers to perform the bandwidth consumption attacks. A lot of responses are generated and they are sent to the targets after the attackers send only...
A visual secret sharing scheme with an access structure based on a given graph has been proposed, and can be considered an extension of (2, n)-threshold visual secret sharing schemes. Ateniese et al. presented a decomposition method in which a dealer decomposes a given graph into star graphs, with qualified participants (vertices in a given graph) who have a common edge if and only if the participants...
Malicious web page is an increasingly important problem that threatens the security of computer systems and users’ privacy. The malicious web pages can escape the traditional static signature-based detection through polymorphism and metamorphism technique. In this paper, we propose a scheme based on information entropy theory to detect the encoded malicious web pages. Through the experiment and evaluation,...
To solve the problem of automatically drawing landmark areas for nice vista points, in this paper, photos metadata of popular urban landmarks or natural landscapes are collected and extracted from Flickr and Google Map. The Landmark Area Recognition System (LARS) is proposed to efficiently recognize astonishing regions of landmarks for exploring nice visiting and photographic POIs (Point of Interests)...
In this paper, we propose a routing protocol AVN-AHH-VBF for underwater wireless sensor networks (UWSNs). Sensor nodes forward data packets in multi-hop fashion within a virtual pipeline. As nodes outside pipeline do not forward data packets, thus, flooding is avoided in the network. Mitigating flooding in network, in turn, decreases energy consumption and improves delivery ratio. Moreover, on each...
Browser fingerprinting is getting popular in cutting edge Web developers. It typically uses the header information, such as user-agent and plugins. However, the header information can easily be modified or altered by configuration or a browser's extensions. Unlike the header information, hardware information is difficult to be changed, and is regarded as valuable information in browser fingerprinting...
Browser history sniffing is one of the exploits in browser security. Weinberg et al. proposed an interactive attack that provides a simple Captcha test to victim users who performs actions that reveal if he/she has visited to particular website or not. The study proposes six examples such as chessboard and word spelling. Their scheme, however, probes one site with one click and hence it is hard to...
Method of balanced scorecard (BSC) may well be one of the most popular strategy management and performance management systems, but BSC can only really success if it is appropriately linked to the employees' intrinsic and extrinsic incentives. In this research, two central issues include motivation and effect on long-term firm value comes into focus in the context of performance evaluation and compensation...
When considering the influence of audit quality for mandatory rotation, the competence and knowledge of successor auditors should be considered in addition to their independence. That is, the choices of successor auditors who are expected to enhance audit quality for companies that rotate their auditors can be seen as a key factor that affects the efficiency of the mandatory audit rotation. This study...
The concept of corporate social responsibility has become increasingly important to businesses today and to those organizations who seek to influence industries and society at large. Based on stakeholder theory, successful companies need CSR to shape their public images and reputations to their customers, communities and other external beneficiaries. The more employees know the corporation contributes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.