The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Examination system is the pivotal point around which the whole system of education is based. Examination system comprises of number of laborious and error prone tasks, needing immense resources and time. Numerous electronic examination systems have been designed with the intent of improving the efficiency of current examination system. However, the existing e-examination systems are usually designed...
This paper analyses the effectiveness of random passwords used in South Indian languages in terms of their entropy value with an objective of recommending passwords with mandatory minimum length to enhance the security aspects in relation to their predictability.
First, the paper gives the definition of the strongly row (column) full rank matrix, the quasi-upper triangular matrix and the quasi-lower triangular matrix of the m × n matrix. Then the triangular factorization is generalized to the m × n matrix, and some factorization theorems are obtained. By using the triangular factorization, the linear equations with strongly row (column) full rank coefficient...
For the past few decades, the area of higher education has been experiencing a time of complete transformation through the use of new and emerging technologies. The transformation of learning, teaching and the classroom depends completely upon the use of various technologies inside the classroom. E-Learning has become a new philosophy and standard in the area of education with the goal being to serve...
For security of Android operating systems, permission-based solutions are one of popular approaches but still exposed to two problems. First, there is coarse-grained relationship between a permission and its associated methods. Second, mobile users do not have rights to control the permissions of their applications. To solve these problems, we propose MacDroid that enables users to control the system...
Network security analysts presently lack tools for routinely screening large collections of network traffic for structures of interest. This is particularly the case when the structures of interest are embodied as summaries of sets of related traffic, essentially behaviour descriptions. This paper sketches a methodology to provide such capability, in the context of flow data. The methodology generates...
A computer database is part of a computer and a set of internal computer data. A computer database plays an important role for information management, which can greatly improve the accuracy and efficiency of information management. A computer database is the future trend of the development of computer, which will have a more significant effect on information management. That computer database technology...
There is a widely accepted need for methodologies to verify the security of services. A typical service requires user data and then makes them available through the Internet independently from access platforms or user locations, but the layman is rarely aware of the entailed risks and seldom acts cautiously. The combined human-and-technology system is complex: it intertwines the technical protocols...
The explosive growth of computer networking enormously increases security costs in universities. It is necessary to encourage the cooperation of students, faculty, and staff through education and training of information ethics, together with improving management and technologies, and as a consequence, to reduce university costs. We have been producing collections of video clips for information ethics...
In recent years, information systems have become more diverse and complex making them a privileged target of network and computer attacks. These attacks have increased tremendously and turned out to be more sophisticated and evolving in an unpredictable manner. This work presents an attack model called AIDD (Attacks Identification Description and Defense). It offers a generic attack modeling to classify,...
FTP protocol is the application layer protocol which is to control two-way transmission of files between two computers on the Internet, It's a common approach to copy the file from the client to server within the enterprise network. However, traditional audit work is facing enormous challenges, though FTP protocol brings convenience to the operator, it may exist ultravires during the operation and...
Opacity is an important security property dealing with the hiding and keeping secret, a subset of a system's behaviour from external observers. A system is characterised as "opaque" if it can effectively hide specific actions from an intruder or attacker. As the need for opacity, and similar fundamental secrecy properties may arise in a wide range of applications and sectors, like health...
Users want to enjoy online services without sacrificing their security. Although there is a trade-off between the security of a service and its usability, the level of security required will differ depending on the user and the situation. To optimize the balance between security and usability, it can be customized for each user and each online transaction. Yet in order to do that, both users and service...
Computer security, school security policy and school computers usability should be important for all school computers and network resources users. But instead of implementing security policy, users often unintentionally compromise computer functionality and security out of ignorance or negligence. Since Windows is the default operating system in the majority of Croatian schools, students often have...
Security over communication is totally essential especially for critical applications such as Military, Education and Financial applications. Unfortunately, many security mechanisms can be broken with new developments in classical computers. Quantum computers are capable of performing high speed simultaneous computations rather than sequentially as the case in classical computers do. In order to break...
Organizations often suffer harm from individuals who bear no malice against them but whose actions unintentionally expose the organizations to risk-the unintentional insider threat (UIT). In this paper we examine UIT cases that derive from social engineering exploits. We report on our efforts to collect and analyze data from UIT social engineering incidents to identify possible behavioral and technical...
In the process of collaborative design, a large number of versions are produced. Storing and accessing versions is very frequent, so version storage in the process of collaborative design has become the core issue of version management. In recent years, how to reduce the storage space and improve the retrieval efficiency has become a research hotspot, however the research of version security is still...
The Communities vary from country to country. There are civil societies and rural communities, which also differ in terms of geography climate and economy. This shows that the use of social networks vary from region to region depending on the demographics of the communities. So, in this paper, we researched the most important problems of the Social Network, as well as the risk which is based on the...
Neurophysiological tools are receiving increased attention in the field of information systems and by organizations to provide new modes of interaction with computers and more insights into the minds of end-users and customers. Academics and members of private industry are leading the charge with new research streams and systems development efforts, but what do our future contributors to society think...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.