The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
DNSSEC offers protection against spoofing of DNS data by providing authentication of its origin, ensuring integrity and giving a way to authenticate denial of existence by using public-key cryptography. Where the relevance of securing a technology as crucial to the Internet as DNS is obvious, the DNSSEC implementation increases the complexity of the deployed DNS infrastructure, which may manifest...
Distributed Denial of Service (DDoS) attacks remain among the most dangerous and noticeable attacks on the Internet. Differently from previous attacks, many recent DDoS attacks have not been carried out over the network layer, but over the application layer. The main difference is that in the latter, an attacker can target a particular application of the server, while leaving the remaining applications...
Identity theft, fraud, and abuse are problems affecting all market sectors in society. Identity theft is often a "gateway" crime, as criminals use stolen or fraudulent identities to steal money, claim eligibility for services, hack into networks without authorization, and so on. The available data describing identity crimes and their aftermath is often in the form of recorded stories and...
Tor is a popular 'darknet', a network that aims to conceal its users' identities and online activities. Darknets are composed of host machines that cannot be accessed by conventional means, which is why the content they host is typically not indexed by traditional search engines like Google and Bing. On Tor, web content and other types of services can anonymously be made available as so-called hidden...
Public user profile information is a common feature of modern websites. These profiles can provide a valuable resource for investigators tracing digital artefacts of crime, but current approaches are limited in their ability to link identities across different platforms. We address this through a service-independent model of user profile information, grounded in the details visible on a number of...
Making violent threats towards minorities like immigrants or homosexuals is increasingly common on the Internet. We present a method to automatically detect threats of violence using machine learning. A material of 24,840 sentences from YouTube was manually annotated as violent threats or not, and was used to train and test the machine learning model. Detecting threats of violence works quit well...
Research shows that Twitter is being misused as a platform for online radicalization and contains several hate and extremism promoting users and tweets violating the community guidelines of the website. Manual identification of such tweets is practically impossible due to millions of tweets posted every day and hence solutions to automate the task of tweet classification is required for Twitter moderators...
No illegal activity is carried out at once. Usually, parties of illegal activity collect and analyze all possible information about the target and carry out the planning and then proceed to the realization stage. In this paper, heuristic algorithm is suggested for detection of illegal activities and permanent monitoring on current situation in the country over the internet.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.