The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article describes the use of the comparison method MM to protect the Internet user from the effects of DNS Injection attacks. A description of the basic concepts of this area of the computer network and the dangers of DNS Injection attacks is presented. The description of the MM method used in the literature is concluded. In the paper the concept of using above-mentioned method to protect Internet...
As the developing of Beidou navigation positioning technology and the wireless Internet, the demand of the mobile phone location service is increasingly urgent. And the location information sharing between each other becomes an important research focus, and also the core of the current location based service (LBS) software. At present, all the related LBS software is based on C/S architecture, developed...
This paper presents an architecture to provide endto- end per-user services with support to client mobility, designed according to the SDN and NFV paradigms. Our service platform dynamically configures and launches service requests when the client connects to the network, which are used by a multidomain orchestration system to arrange the required network configuration and computational resources...
The report addresses a remote molecular diagnostics system for studies of the edge plasma inT-10 tokamak at National Research Centre Kurchatov Institute. Web control of a monochromator and a CCD camera based on Internet technologies was used to monitor radiation. The structure and communications chart of the software components implemented in the system are described. A special web application has...
Nowadays the Internet is closely related to our daily life. We enjoy the quality of service the provided by The Internet at the same time, but also suffer from the threat of network security. Among the many threats, SQL injection attacks are ranked in the first place. SQL injection attack refers to “when the user sends a request to the server, the malicious SQL command will be inserted into the web...
Internet plays a significant role that it has helped the mankind to be advanced. One of the remarkable applications of Internet is the feature that enables to download any form of data. In order to accomplish it, devices are required that has specific functions. When a PC works for downloading purpose, it uses all its resources, though they are not wholly required and leads to large power consumption...
In current digital world, more victims are affected by cybercrime. Cyber world are wide open and it is very easy to target to access data or financial information from any individual, public and private organizations etc., since, internet and web are open, it is very easy to steal data on the unsecured medium of channel. Therefore, protecting financial data required further layers of security counter...
This article is devoted to methods of improving the efficiency of security systems using Honeypot technology. There are observed basic principles of creating the protection system using this technology. There are suggested methods of web services organization which use affected software to efficiently detect intrusions. There are also given options of collecting statistical information about attacker's...
In this paper we are showing a financially savvy and effortlessly implementable i-voting (web voting) framework particularly for India in view of adhoc network. The essentials of cognitive radio innovation and Adhoc organize in view of cognitive radio technology are initially presented. The idea of smart i-voting framework is then proposed and how it can be executed in suburban region where web services...
Early detection of any exceptional behavior coupled with comprehensive analysis of related data can significantly reduce performance bottlenecks and outages in any system. Collating the relevant data points and establishing correlation between them to provide an abstract view of potential hotspots has been a challenge in any large multi-tier systems. This paper describes a framework that shall enable...
From 2004 to 2016 the Leipzig Linguistic Services (LLS) existed as a SOAP-based cyberinfrastructure of atomic micro-services for the Wortschatz project, which covered different-sized textual corpora in more than 230 languages. The LLS were developed in 2004 and went live in 2005 in order to provide a webservice-based API to these corpus databases. In 2006, the LLS infrastructure began to systematically...
Since the amount of information submitted and made public about tourist spots in urban areas is very large compared to that for regional tourist spots, it is difficult for people who do not have much knowledge of or acquaintance with the places concerned to efficiently obtain information necessary for taking tourist trips. This study aims to develop a social recommendation media GIS (Geographic Information...
In this excerpt from a Software Engineering Radio podcast, James Phillips, who works on the open source service discovery tool Consul at HashiCorp, explains what service discovery is, provides use cases, and discusses available tools. You can listen to the entire interview at <url>www.se-radio.net</url>.
The proposed NMS, called ITB NMS, is a web-based centralized management system used to manage and monitor the current condition of the entire existing network infrastructure clearly and concisely. ITB NMS is used to monitor a device or devices connected to the network-based LAN, WAN or Internet. ITB NMS is able to monitor the condition of a device or monitor the activities being performed by a device...
Chat application is a feature or a program on the Internet to communicate directly among Internet users who are online or who were equally using the internet. Chat applications allow users to communicate even though from a great distance. Therefore, this chat application must be real-time and multi platform to be used by many users. The development of information and communication technologies are...
There are several methods proposed to extract data from biological databases developed by bioinformatics experts. These methods retrieve bioinformatics information through the use of structured and semi-structured data tools from remote database servers. This paper investigates and evaluates the performance of these methods in terms of their ability to gain access to a cross representation of bioinformatics...
The advances in embedded technology and automation makes the human daily life easier. In this study, a smart home is presented an application including sensor and controller nodes connected to the custom design local wireless network. User reaches to the system using a web-base interface or using a smart phone application. We tested our system through conducted experiments and the results will be...
As one of the basic data resources of Internet, IPv4 address is the most important identity for terminal users to access online resources. With the development of modern Internet, more and more intelligent applications need the terminal's geolocation information to supply high quality services. How to locate the geolocation of the source IP address has become a very important topic in Internet research...
Advanced Persistent Threat, one of the most popular network attacks, has drawn great attention of all over the world because of its huge perniciousness. As the excellent imperceptibility as well as long-term persistence in APT attack, this paper proposes a prediction model based on dynamin Bayesian game. Focusing on the particular features in APT, a corresponding quantitative method is proposed for...
Spam messages propagate malware, disseminate phishing exploits, and advertise illegal products. Those messages generate costs for users and network operators, but it's difficult to measure the costs associated with spam traffic and determine who actually pays for it. Here, the authors provide a method to quantify the transit costs of spam traffic, identifying the routes traversed by spam messages...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.