The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Microblogging has spread to fields where real-time awareness is crucial, such as predicting natural disasters or health outbreaks. Services such as Twitter can provide time-sensitive information from citizens, who have become sensors of important events by means of their digital footprints left through the use of mobile devices. User-generated data in urban contexts have been explored, mainly to infer...
The paper provides a study of situation awareness mechanisms in modern telecommunication networks on the essential basis of the actual Self-NET research Project effort. Since cognition has today become one of the key features of most systems, novel mechanisms for identification, comprehension and corresponding reaction to altering environmental conditions are continuously being developed. The necessity...
Analyzing the behavior of learners in an educational system is the first step towards an implicit method for learning style diagnosis. To this end we performed an experimental study (reported in this paper) involving 75 students, whose interaction with WELSA educational system was monitored and analyzed. The investigation emphasized statistically significant relations between learning preferences...
Timeout mechanisms are a useful feature for web applications. However, these mechanisms need to be used with care because, if used as-is, they are vulnerable to timing attacks. This paper focuses on internal timing attacks, a particularly dangerous class of timing attacks, where the attacker needs no access to a clock. In the context of client-side web application security, we present JavaScript-based...
Regardless of which networking protocols or technologies form the core of the future Internet it is clear that the environment as a whole will need to support a very broad range of business and user interaction modes. In todays Internet we observe the growing trend for services to be both provided and consumed by loosely coupled value networks of consumers, providers and combined consumer/providers...
Defenders of today's critical cyber-infrastructure (e.g., the Internet) are equipped with a wide array of security techniques including network-based intrusion detection systems (IDS), host-based anti-virus systems (AV), and decoy or reconnaissance systems such as host-based honeypots or network-based telescopes. While effective at detecting and mitigating some of the threats posed to critical infrastructure,...
As most of existing worm detection methods have a number of significant hurdles to overcome in order to employ such actions as blocking unsecure ports, dropping potentially threatening packets, and eliminating emails carrying malicious codes, breaking communication between infected and non-infected hosts to slow down worm propagation and minimize potential damage. The most noteworthy obstacle is the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.