The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The life-science and health care research environments offer an abundance of new opportunities for improvement of their efficiency and productivity using big data in collaborative research processes. A key component of this development is e-Science analytics, which is typically supported by Cloud computing nowadays. However, the state-of-the-art Cloud technology does not provide an appropriate support...
Reconfiguration of connections along frequency axis, — similar to frequency hopping in wireless systems, has been shown to improving security in elastic optical networks (EONs). However, the effect of spectrum reallocation on the connections' blocking and the associated connections' security is still under-explored. In this paper, we examine the effect of reconfiguration of connections on its security...
Internet of things (furthermore IoT) by definition refers to a networked interconnection of devices in everyday use that are often equipped with ubiquitous intelligence. It is based on processing of large quantities of data in order to provide useful information/service and enables an efficient regulatory policy in the area of IoT. One of the key challenges for the realization of the IoT includes...
Suitable level of knowledge about digital risks is a vital part of the teacher's responsibility for safe manipulation with web contents. The teacher often presents the first barrier and safe haven for the children against the potential digital risks and the demand for this knowledge rapidly increases. The appropriate attitude toward digital risks should start developing from the early beginning of...
With billions of emails exchanged worldwide on a daily basis, email is nowadays considered to be one of the most widespread forms of digital communications. The massive deployment of this technology is certainly due to its ease of use and interoperability. This advantageous ubiquity of email communications comes nonetheless at the cost of security, which is often side-lined in favour of maintaining...
The use of mobile devices in healthcare offers various new possibilities and is spreading very fast due to this. However, the security aspects of mobile device use are often neglected. According to research, 44 percent of all data breaches happen in healthcare alone. Most of these breaches are directly related to mobile device use. In this paper, we conduct a literature review of mobile device security...
The number of mobile device users is rapidly growing and spreading to new populations, such as seniors and children. Users are increasingly more vulnerable in the cyberspace despite available security measures. This leaves many opportunities for potential attackers as mobile devices are connected to the cyberspace practically 24/7. Unawareness of mobile device users who do not know neither the challenges...
Aim of this research was to examine familiarity of students in Croatia with threats in form of social engineering and phishing attacks. To obtain our research data, a practical assessment of student's capabilities to identify phishing attacks against them was conducted with the help of a graphical questionnaire that presented real phishing messages that tried to identify what kind of scams or attacks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.