The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As e-commerce sales continue to grow, the associated online fraud remains an attractive source of revenue for fraudsters. These fraudulent activities impose a considerable financial loss to merchants, making online fraud detection a necessity. The problem of fraud detection is concerned with not only capturing the fraudulent activities, but also capturing them as quickly as possible. This timeliness...
Social networks are playing an important role in personal as well as corporate environments. However, perceived issues and evolving challenges may hinder further expansion of social networks to meet new opportunities. In this paper, we review inherent concepts and properties of social networks and highlight major analytical evaluation criteria, which are used to identify key findings that reveal degrees...
In a faceless business transaction such as in e-commerce, trust plays a major influence on a customer's decision making behavior. Trust on e-commerce is very much dependent on the information obtained from the vendors' websites. From our own personal experiences with e-commerce websites, it is not unusual to find some essential information missing. In this paper, we present to the readers our findings...
Pervasive computing is a rapidly developing area of Information and Communications Technology (ICT). It refers to the increasing integration of ICT into people's lives and environments, made possible by the convergence of advanced electronic - and particularly, wireless - technologies and the Internet. Wireless technologies are expected to connect various devices in many potential applications, from...
Collaborative Recommender system helps the online users to identify the right product during electronic purchasing. The collaborative recommender system identifies the similar users based on the purchasing or rating behavior to the active user and then recommends the product based on the similar users. Collaborative recommender system is widely used in majority of the existing online recommender system...
Traditional anti-tampering system can not guarantee its own security. in order to reduce tampering and ensure the integrity of Web pages and web server security and the stability of operation, the paper analyzes the current anti-tampering technology of several webs, and introduces the model three-threading technology based on the existing anti-tampering technology and the multi-ring structure of the...
This paper puts forward an automatically generated system of attack signature based on virtual honeypots, which adopts an open source software virtual honeypot-Honeyd, uses the plug-in-supporting function of Honeyd, and sets up Signature Generation System (SGS) to generate attack signature for Snort automatically. SGS carries out the intrusion rule extraction of data packets which have entered Honeyd...
Measuring trust among social network users is an important research issue. In this paper, we present a new trust model based on emails. We name this new trust model as Email Trust (EMT). EMT is constructed based on the interactions among users via their daily emails, which provides a level of belief on the data transmitted by a use. In EMT, we require each user to perform a trust checking procedure...
Along with recent Internet security threats, different security measures have emerged. Whilst these security schemes ensure a level of protection against such threats, they sometimes have significant impact on perceived Quality of Service (QoS). There is thus need to retrieve ways for an efficient integration of security requirements with their QoS counterparts. In this paper, we devise a Quality...
Internet banking is a new channel and area for the banking business development and security is the key factor. The paper starts from the security problems Internet banking are facing, tries to explore various of security mechanism measures personal Internet banking is currently taking of, and at last analyses the current representative of the online banking security measures with the case of professional...
Facing the emerging circumstance that the Internet and business globalization have replaced the separation that was typical of the traditional business paradigm, there is a growing concern for security and privacy of data and services. With the emergence of varies Grid projects, how to implement the interoperations among different Grid environments has become a new problem and the secure one should...
In the process of software production, testing is the premise to guarantee the quality of software. With the extensive application of network software, Web security test has become a key point that can not neglect. Based on the Analytic Hierarchy Process (AHP) algorithm, a new kind of Web security testing programme was introduced in this paper. According to which it realized the Web Security auto-Testing...
The cheap and low-quality sensor devices are usually used for event detection in Internet of Things (IoT), and they put limitations on power, memories and computing capabilities. Those limitations need to be considered while designing our outlier detection algorithm. In this paper, we try to present an adaptive online outlier detection algorithm to handle data measurements for event detection. Namely,...
Grid computing provides integrated high-end compute resources across administrative domains. More and more grid infrastructures are being used for mission-critical scientific and engineering applications. Ensuring security and safety of grid environment is a key challenge faced by grid community. First step towards grid security is to be aware of vulnerabilities and weaknesses in the entire grid....
Malicious web pages that launch client-side attacks on web browsers have became a severe threat in today's Internet. High-interaction client honeypots are security devices that detect these malicious web pages on a network. However, high-interaction client honeypots are not good enough for detecting malicious web pages, especially for web pages carrying rootkit which is used to hide the presence of...
Web applications under attack may perform undesirable behaviors against their use case specification. These attacks exploit web vulnerabilities which are usually considered as consequences of abusing web resources. The paper proposes a resource-based approach to formalize use case specification for web applications. The goal of the research is to identify and organize web resources, and to integrate...
With the development of the Internet, application programs on the web page become widespread. Information appearing on the web page has evolved from static presentation to dynamic presentation and even being interactive with the users. Some malicious users employ malicious browsing behaviors, such as flooding attack, to cause waste of resources and bandwidth of the host for the web page. Since the...
Following with the advancements in digitization technology and broadband communication technology, realtime video streaming service has become an essential one for next generation Internet. When transmitting compressed video across the Internet, however, one of the main challenges is packet error/loss. High coding dependencies among video frames suffer from vulnerability to packet loss, which impacts...
The Multiple Classifier Systems are nowadays one of the most promising directions in pattern recognition. There are many methods of decision making based on classifier groups. The most popular are those methods that have their origin in voting, where the decision of the common classifier is a combination of simple classifiers decisions. The paper presents an idea how a decision about attack in application...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.