The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents an overview of a new pattern methodology which is oriented to achieve basic usability and security design requirements in websites. We emphasize the need of adequate and uniform guidelines useful to incorporate essential security and usability aspects in websites. In order to diminish this problem a methodology is provided to developers with guidance in designing a trustworthy...
Being a novel P2P system, P2P E-commerce faces all network security issues as ordinary P2P systems do. One of the most severe threats is the imminent worm attacks aiming at P2P systems. Simple definition and taxonomy of P2P worm are presented and characteristics of different types of P2P worm are discussed. The possibility of using P2P system to contain P2P worm is explored, and preliminary countermeasures...
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
This speculative paper outlines an untested idea: it superficially compares security testing with usability testing. Looking for analogies between these fields may seem far-fetched, but the result is surprising. When it comes to testing, usability and security may be not as dissimilar as they seem. A closer look at usability testing may yield new insights for security testing.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.