The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network forensics technology with active and real time response characteristics is a new approach that can be used for investigation of network attack such as denial of service (DoS) attack. Once a system is compromised, the forensics and investigation is often always done after the attacks whereby some useful instant evidence is lost. The adaptive capture without loss of potential sensitive traffic...
This paper discusses the properties of ubiquitous systems and brings to light the software requirements for such systems. Our study has shown that the primary principle behind all ubiquitous applications is to provide the users with intelligent learning systems that supplement their everyday activities. This is the primary consideration on which a ubiquitous application can be evaluated. This paper...
ldquoSimplerdquo rules and laws are necessary for the understanding of the meaning and the content. Exactly this requirement is a fundamental claim of all citizens. The instruments of legislation are deeply connected to the principles of the Roman Law and the ideas of the former centuries. Modern effective aspects as visualization, structuring, consistent logical connections, and object-orientation...
Recommender systems, as effective approaches to information overload issue, have attracted researcherspsila attention especially in the field of electronic commerce. They provide personalized recommendations on products/services to customers. From a sellerpsilas point of view the process of recommendation is a multi-criteria decision problem. So the recommender systems can also be seen as decision...
The importance of detecting similar documents grows rapidly as the amount of information increases exponentially. This paper presents a new technique for identifying similar documents. It combines statistical properties of documents with Persian linguistic features. The proposed technique is mostly suited for detecting similar documents in specific fields. The proposed method is built on lexical chain...
The Internet worm infects the computer system, network packet, communication performance, and the traditional method of managing network using SNMP to monitor abnormal network traffic. To monitor suspicious Internet activity and to recognise the Internet worm categories, we proposed FloWorM system that can reduce the misjudgment and detection rate based on NetFlow which analyse the source data from...
Credit card fraud on the Internet is a serious and growing issue. Many criminals have hacked into merchant databases to obtain cardholder details enabling them to conduct fake transactions or to sell the details in the digital underground economy. The card brands have set up a standard called PCI DSS to secure credit card details when they are stored online. We investigate the standard and find significant...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.