The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many computer security technologies are at risk of proving failure to their extreme vulnerability. Our computers defense mechanisms have been going on for years now and yet have not resulted in an extremely flexible set of protections. Organizations focus on the ability of security technology to minimize risks but threats to computer security are continuing. In other disciplines, looking to nature...
This paper focuses on the adoption of Agent Technology to calculate and evaluate the Web Content Engagement Time (WCET). Traditional Web traffic analysis metrics such as pageviews, unique browser, visitor loyalty, etc have been used to analyze the Web traffic behaviour for a long time since the birth of World Wide Web, but the emersion of software robots and Web crawlers trigger a huge impact on the...
This paper describe a method that has as purpose closing the gateways that the Web bots can use in order to perform automatically a series of on-line operations meant to be fulfilled by the human operators. The applications that benefit from the actual implementation of the solution are either client-to-business or business-to-business Web distributed products. The solution refers to protecting the...
The rapid development of data technology, as exemplified by data mining and Internet growth, creates a large information overload and forthcoming knowledge overload. Data mining discovers a large mount of knowledge, but not all of the knowledge is useful. Meanwhile the useful knowledge will also become un-useful as time goes by. How to manage this kind of knowledge is an urgent problem for data mining...
As cyberspace has evolved into a large, dynamic, and tangled web of computing devices, engineers often fail to design in dependability properties-such as stability, robustness, and security-at the system level. Consequently, unintentional and malevolent actions taken in cyberspace have affected critical infrastructures in the physical world. These disturbances and systems' resultant undependable behavior...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.