The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Based on its daily use and volume of its applications -- both domestic and corporate environments -- it cannot be denied that Web Browsers are very important tools. However, due to the increase of its use, the web environmentpresents itself as an increasingly hostile place where peopleperform malicious cybercrimes aiming to steal or to tampersensitive information of the web uses. These illegal activities...
DNSSEC offers protection against spoofing of DNS data by providing authentication of its origin, ensuring integrity and giving a way to authenticate denial of existence by using public-key cryptography. Where the relevance of securing a technology as crucial to the Internet as DNS is obvious, the DNSSEC implementation increases the complexity of the deployed DNS infrastructure, which may manifest...
Military intelligence analysis (IA) support tools are often developed using generalized models of IA that fail to take into consideration the real-world constraints put on analysts by factors such as organizational structures and cultures. IA in domains where distributed collaboration is required because direct communication and coordination is infeasible represents a challenge for generalized models...
As computing and communication technologies become ubiquitous throughout society, researchers and practitioners have become motivated to advance current cybersecurity capabilities. In particular, research on the human element behind cybercrime would offer new knowledge on securing cyberspace against those with malicious intent. Past work documents the existence of many hacker communities with participants...
When we read a piece of writing, the meaning we derive from that text often includes information about the authors themselves. Clues to their identity, worldview, and even psychological states are encoded in features such as word choice and sentence structure. This work describes how writing style features can be used to analyze the authorship of extreme jihadist writing. Inspire magazine is an online,...
Social media has become an important communication tool especially following an extreme event. Research in social psychology has shown that people engage in gathering and "milling" information, and confirmation seeking during the process of forming intent to take action or voice an opinion. Twitter serves as a communications channel where people converge to compile collective intelligence,...
Analysing public sentiment about future events, such as demonstration or parades, may provide valuable information while estimating the level of disruption and disorder during these events. Social media, such as Twitter or Facebook, provides views and opinions of users related to any public topics. Consequently, sentiment analysis of social media content may be of interest to different public sector...
In recent years, understanding the people behind cybercrime from a hacker-centric perspective has drawn increased attention. Preliminary exploration in online hacker social dynamics has found that hackers extensively exchange information with others in online communities, including vulnerabilities, stolen data, etc. However, there is a lack of research that explores automated identification and characterization...
The underground economy is a key component in cyber carding crime ecosystems because it provides a black marketplace for cyber criminals to exchange malicious tools and services that facilitate all stages of cyber carding crime. Consequently, black market sellers are of particular interest to cybersecurity researchers and practitioners. Malware/carding sellers are critical to cyber carding crime since...
If a piece of disinformation released from a terrorist organization propagates on Twitter and this adversarial campaign is detected after a while, how emergence responders can wisely choose a set of source users to start the counter campaign to minimize the disruptive influence of disinformation in a short time? This practical problem is challenging and critical for authorities to make online social...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.