The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Computer and mobile phone based crimes have increased alarmingly in India. From the unauthorized dissemination, keeping information systems secure from tampering and from unauthorized removals are the need of the hour, otherwise, the incidents of hacking, data theft, cyber bullying and now cyber extortion as well has kept the cyber security team on its toes. For this a majority of the respondents...
In content-centric networking, the schemes of innetwork caching can affect the performance of the whole network. Existing schemes lack of the global view, which results in inefficient caches. In this paper, we aim to analyze the real-time distribution of contents among caches from multiple perspectives. This paper proposes TCBRP, a scheme that analyzes caching tendency of various contents in reverse...
In the research of the anomaly detection system analyzing the packet header on the Internet, previous researches have proposed the anomaly detection system using chi-square values in terms of the source IP address and/or the destination port number. In these previous researches, the chi-square values were calculated from one feature causing the degradation in the False-Positive when the same symbol...
Development organizations often do not have time to perform security fortification on every file in a product before release. One way of prioritizing security efforts is to use metrics to identify core business logic that could contain vulnerabilities, such as database interaction code. Database code is a source of SQL injection vulnerabilities, but importantly may be home to unrelated vulnerabilities...
As computer systems become increasingly complex, system anomalies have become major concerns in system management. In this paper, we present a comprehensive measurement study to quantify the predictability of different system anomalies. Online anomaly prediction allows the system to foresee impending anomalies so as to take proper actions to mitigate anomaly impact. Our anomaly prediction approach...
The awareness and acceptance of consumer on Virtual goods are the research focus in the evolution of the internet business model. The Paper based on the technology acceptance model, designs the acceptance extended model for virtual items consumption in the internet environment, uses the model to create attitudes and intentions model of consumer for virtual items, introduces structural equation model...
This paper presents a protocol designed as an alternative to classical TCP for channels which experience high loss-rates. The protocol is simplified with respect to TCP by eliminating the need of retransmissions and the associated buffers. This is achieved by applying a rateless erasure correcting code to the data that is going to be transferred. A modified version of the TCP congestion control algorithms...
High definition video streams are gaining larger shares of the Internet usage for typical users on daily basis. This is an expected result of the current boom in the online standard and high definition (HD) video streaming services such as YouTube and Hulu. Because of these video streams' unique statistical characteristics and their high bandwidth requirements, they are considered to be a continuous...
Compared to traditional service, the characteristics of the customer behavior in electronic service are personalized demand, convenient consumed circumstance and perceptual consumer behavior. Therefore, customer behavior is an important factor to facilitate online electronic service. The purpose of this study is to explore the key success factors affecting customer purchase intention of electronic...
In this study, a framework based on the theory of planned behavior was proposed to find out the major factors which could have influences on learners' knowledge sharing intentions. A field survey has been conducted with 150 learners who had experiences in web-based learning. The proposed hypotheses were examined by structural equation modeling. According to the analysis results, we have found that:...
This study applying E-S-QUAL scale to analysis the factors affecting consumers to use internet banking services. Four factors were identified: e-service quality, e-customer satisfaction, perceived value and e-loyalty. Structural equation modelling (SEM) was computed to determine the relationships among these factors. The main results are as follows: there is 1) a positive relationship between e-service...
In so far as users can have access to required data among piles of documents in World Wide Web, there is need for systematic methods of search. This paper puts to evaluation the extent of relationship between a semi structured HTML and ontology using some statistical techniques. For this purpose, having considered the existing data in ontology, what be calculated is the expected density and expected...
Empirical analysis and mathematical modeling have been the foundation for a great deal of network research and have resulted in significant improvements to Internet systems, protocols and practices. Recent progress applying a constantly expanding set of sophisticated statistical tools and mathematical techniques suggests the emergence of a new type of measurement-based networking research that could...
This paper presents an approach for acquiring academic bilingual resources from the Web paper libraries. By analyzing the structured information of Web pages, we first implement a customized crawler to download these pages including paper details, and then use a parser to transfer them into XML format. Based on the classic statistical method for sentence alignment, we propose an improved approach...
In this work, we present an analytical model of malware spreading in wireless personal area networks (WPAN) based on IEEE 802.15. This model describes WPAN by means of some statistical parameters such as the average node degree of the network, the average encountering rate between nodes and the duration of connection etc. Also it expounds what effects the network protocols and moving patterns have...
Enormous adverse impacts of Internet worms have attracted strong interest from the academia to model their propagation. This paper presents a dynamic parameter branching process to characterize the spread of scanning worm on the Internet. Firstly, the paper demonstrates that the spread of scanning worm is a typical branching process with dynamic parameters rather than a static parameter. Secondly,...
To defend DoS (Denial of Service) attacks, an access filtering mechanism is adopted in the firewall. The difficulty to define the filtering rules lies where normal and anomaly packets have to be distinguished in incoming packets. The purpose of our research is to explore the early detective method for anomaly accesses based on statistic analysis. In this paper, we defined the chi-square method, and...
This paper presents a comprehensive analytical approach to maintain queuing delay in a router at a required level through closed-loop feedback control under aggregated traffic flows from various traffic classes. The approach is able to bound average queuing delay but still achieve a high system utilization by regulating traffic arrival rate implicitly through a movable queuing threshold. The queuing...
Many people have been addicted to internet and game. The addiction has aroused great concern from the public and specialists. In this paper we measure the psychological state of internet addicts by some famous mental scales, and investigate their life qualities by some questionnaires. When we get basic data we make some basic statistical analysis, and use structural equations model (SEM) to analyze...
Network topology plays an important role in design and optimization of routing protocols and network algorithms. Based on the characteristics of real networks and local world phenomenon, this paper proposes a evolving scale-free network with tunable clustering coefficient(SFTC) by introducing triad formation, which dynamically simulates the adding and deleting of nodes or edges, and the evolvements...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.