The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Once we had tried to propose an unbreakable CAPTCHA and we reached a result that limitation of time is effect to prevent computers from recognizing characters accurately while computers can finally recognize all text-based CAPTCHA in unlimited time. One of the existing usual ways to prevent computers from recognizing characters is distortion, and adding noise is also effective for the prevention....
Domain names and domain name system (DNS) have been used and abused for over 30 years since the 1980s. Although legitimate Internet users rely on domain names as their indispensable infrastructures for using the Internet, attackers use or abuse them as reliable, instantaneous, and distributed attack infrastructure. However, there is a lack of complete understanding of such domain name abuses and the...
The Internet of Things (IoT) is the ever-growing network of physical devices with IP addresses for Internet connectivity. Due to its ubiquitous nature and distributed architecture which includes devices, applications and humans, it presents a complex structure for security. Also, the incorporation of thousands of heterogeneous IoT devices with different characteristics into a single network creates...
To expose more users to threats of drive-by download attacks, attackers compromise vulnerable websites discovered by search engines and redirect clients to malicious websites created with exploit kits. Security researchers and vendors have tried to prevent the attacks by detecting malicious data, i.e., malicious URLs, web content, and redirections. However, attackers conceal a part of malicious data...
The TLS protocol is the primary technology used for securing web transactions. It is based on X.509 certificates that are used for binding the identity of web servers' owners to their public keys. Web browsers perform the validation of X.509 certificates on behalf of web users. Our previous research in 2009 showed that the validation process of web browsers is inconsistent and flawed. We showed how...
SQL Injection Vulnerability (SQLIV) has been the top-ranked threat to the Web security consistently for many years. Penetration tests, which are a most widely adopted technique to detect SQLIV, are usually affected by testing inaccuracy. This problem is even worse in inferencebased, blind penetration tests for online Web sites, where Web page variations (such as those caused by inbuilt dynamic modules...
Currently, authentication methods using ID and password are widely used and fulfilled central roles in various information systems and services. Our university also uses ID and password for authentication of most services. However, passwords have various problems such as reuse, phishing and leakage. This research is a practical experiment in order to implement an integrated authentication system without...
In this paper, we investigate the effect of scale-free structure of a network topology on performance of CCN (Content-Centric Networking). Specifically, we generate multiple scale-free and non-scale-free network topologies by two synthetic network generation models (i.e., scale-free tree and generalized BA model). We compare the average delivery delay and throughput of CCN with scale-free and non-scale-free...
In this paper, we propose a modeling approach for a Content-Centric Networking (CCN) network by considering the dynamics of its transport layer protocol. Transport layer protocols for CCN have mainly been investigated through simulation experiments because CCN itself is a complicated network architecture compared with IP, and the complex interaction between CCN caching and the behavior of a transport...
To make open source software development successful, acquiring contributors from outside is an important factor. However, despite the need for external contributions, many projects have disappeared without being able to acquire contributors. GitHub, an Internet hosting service for the purpose of open software development, is widely used for research projects of related topics. However, different from...
Recent research trends in network science are shifting from the analysis of single-layer networks to the analysis of multilayer networks. In particular, the robustness of multilayer networks has been actively studied. There exist two popular multilayer network models: one is interdependent network, and the other is multiplex network. We aim to construct a methodology for effectively improving the...
In this paper, we derive the average message delivery of epidemic routing with broadcasting ACKs (ACKnowledgements) in DTN (Delay/Disruption-Tolerant Networking). The epidemic routing achieves near-optimal performance in terms of the message delivery delay when there exists only a single message in the network. However, if there exist multiple messages, epidemic routing generates excessive amount...
The Fog, Edge, or Internet of Things is critical to a variety of businesses not only as an emerging technology, but as a critical enabler of key business strategies and in terms of its underlying economics and financial implications.
Deploying composite applications to Fog nodes in a QoS- and context-aware manner is challenging due to the heterogeneity, scale and dynamicity of Fog infrastructures.
Fog computing is an attractive model for systems in which people live inside of the system with the goal of living smarter.This panel presentation discusses the security and privacy issues of people living within a Fog.
Fog computing has emerged as a promising solution for the Internet of Things (IoT) and next generation mobile networks. As an extension to cloud computing, it enables service provisioning along the continuum from the cloud to things for reducing latency and bandwidth demands, and for empowering end users in their vicinity. Specifically, fog computing can pool resources anywhere along this continuum...
Survey and interview data indicates that companies have abandoned their obsession with elaborate, "validated" business requirements and are adopting emerging technologies rapidly to enable digital transformation.
Graphical models for business processes are very large and cumbersome to build. Reusable process patterns can make this modeling task much easier. While using reusable components is a well-explored subject in software engineering, not much has been done in the context of business process modeling. In this paper, we will present an extension to Business Process Model and Notation (BPMN), the standard...
With the advent of technologies such as Internet of Things (IoT) and Cloud Computing we have now entered the Big Data era. In particular, in a modern sensor-laden environment, often called smart environment, we expect that a huge amount of data can be generated from many sources including hardware and software sensors, and oftentimes humans as sensors too. The significant amount of data thus generated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.