The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To improve the shortage of the existing online examination system, a common online curriculum examination system is designed and realized. Mainly from the system function design, database design and security mechanisms design, the paper elaborates the implementation of the system. Many courses and a variety of questions can be taken into account by the system, and also flexible and comprehensive exam...
The explosive growth of computer networking enormously increases security costs in universities. It is necessary to encourage the cooperation of students, faculty, and staff through education and training of information ethics, together with improving management and technologies, and as a consequence, to reduce university costs. We have been producing collections of video clips for information ethics...
Using game in teaching or game-based learning (GBL) has been a subject of interest since the introduction of computer games in late 1970's. In fact, military, education, marketing and advertisement has been widely utilized GBL in their operations. Despite its popularity, its empirical evidence on the effectiveness as learning and training tool is still lacking. The main aim of this research work is...
CAPTCHA (Completely Automated Public Turing Test to tell Computers and Human Apart) is widely used than before, which becomes the common part of current website login system. However, the CAPTCHA implementation is tricky and risky without deliberate design. In this paper, we give a study case of the vulnerabilities in current login website using text-based CAPTCHA. Our target is a website of mainstream...
Our research concentrates on anomaly detection techniques, which have both industrial applications such as network monitoring and protection, as well as research applications such as software behavioral analysis or malware classification. During our doctoral research, we worked on anomaly detection from three different perspective, as a complex computer infrastructure has several weak spots that must...
Phishing is a form of electronic deception in which an attacker tries to cause the recipient to do something or disclose data that they likely would not normally do by mimicking a trustworthy entity. These attacks have been increasing at an alarming rate and can cause damages in the form of identity theft, financial losses, and compromised security for organizations and governmental institutions....
Personal information management (PIM) pervades every aspect of our lives, including health care. As users of the health care system, we rely on our ability to manage information to combat illness and stay healthy. When seeking help for a health-related problem or question, we navigate a complex system where health services are distributed across multiple clinicians in a variety of specializations...
Computer basic teaching aims to develop and improve the quality of students' computer literacy, to have proficiency in computer application skills for students. Therefore, we must oriente to people, individualize students, we must combinatie the computer basic education and professional education. In this paper, we combined the actual condition of xinjiang agricultural vocational college with its...
In this paper, firstly, the network engineering(NE) training goal are determined based on engineering capability, it is constructed that the professional competence curriculum system based on the “3DCC”. Then, the practices system of network systems engineering based on the engineering capabilities are implemented. Lastly, the “4331” innovative practice teaching platform are constructed, and the basic...
By analysis of the network attacks, three stages structure model and immunity parameters of network attacks are modeled, the evaluation tactic of immunity attacks are proposed, and the network attacks model based on immunity is proposed based on these. The design of network attacks' simulation system is also given, so that the simulation research of network attacks can be done by using the system.
The authors are engaged in on-going research on the functionality of Electronic Health Records (EHR) software, and challenges doctors and nurse practitioners face when they migrate from paper to electronic-based record keeping. Our goal is to assist small practices in the adoption of EHR software and in the optimization of their clinical and practice management functions. In this paper, we discuss...
Computer security and usability are challenging problems that are often interrelated. In harmonizing security and usability, it isn't enough to consider how human factors can be leveraged in support of security. Instead, it's important to take a user-centered perspective, and consider how best to support people in attaining their goals when they use computer systems. This article approaches this problem...
Trustworthy network is an inevitable trend in the development of high trusted computing and Internet. Behavior evaluation is an important research topic in trustworthy network. Till now, most effect focuses on the validity of host's and user's identity, such as integrity measurement and access control, which could not guarantee the trustworthiness of valid user's behavior. In this paper, we proposed...
Several previous studies have shown that threat detection performance of X-ray operators can be increased substantially if computer-based training (CBT) is used. This applies particularly to objects that are never or rarely encountered at a security checkpoint as for example Improvised Explosive Devices (IEDs). However, little is known so far about the importance of using different types of IEDs in...
This paper designs and implements a network worm detection prototype system. The system includes four components: (1) the network status information collection subsystem, including two modules: monitoring module, to achieve real-time capture of network data packets from the network, and pre-process these data packets to form statistics information can be submitted; data storage module, to store the...
The rapid burst of Internet usage and the corresponding growth of security risks and online attacks for the everyday user or the enterprise employee have emerged the terms Awareness Creation and Information Security Culture. Nevertheless, security education widely has remained an academic issue. Teaching system or network security on the basis of practical experience inherits a great challenge for...
The nature of the daily security business at airports (e.g. fast changing regulations) demands more and more flexible training and communication solutions for security officers at airports. Classical classroom training is a proven way for (re-training, but alternative tools, in particular e-solutions, could be taken into account more often to support the classical method of training. In this paper,...
Social Engineering (SE) is considered to be one of the most common problems facing information security today. Detecting social engineering is important because it attempts to secure organisations, consumers and systems from attempts to gain unauthorized access or to reveal some secrets by manipulating employees. The aim of this work is to introduce a new technique for detecting social engineering...
By the analysis and comparison of the application of domestic and overseas computer forensics education, combining with the demand of the industry, the characteristics of subjects and the aim of police education in China, an innovative program in computer forensics has been developed and begun in fall 2007. This four-year program consists of courses in general education, major (computer crime and...
Mobile communication has been heavily applied in the current healthcare system for health information exchange. Patient information security has become a major concern, especially with the wide adoption of electronic medical records. Mobile forensics has been utilized by law enforcement to systematically procure and preserve mobile evidence. However, the adoption of mobile forensics in the healthcare...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.