The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today almost everyone is using internet for daily activities. Whether it's for social, academic, work or business. But only a few of us are aware that internet generally we access only a small part of the overall of internet access. The Internet or the world wide web is divided into several levels, such as web surfaces, deep web or dark web. Accessing internet into deep or dark web is a dangerous...
Nowadays, the internet is playing a major role in everyday life, becoming the first choice for sharing information. In the last sixteen years the number of websites increased from three million to almost one billion. An important contribution to this number was brought by the content management systems which provided an easy approach for any user to create its own website without having advanced programming...
Today the amount of information in the internet growth very rapidly and people need some instruments to find and access appropriate information. One of such tools is called recommendation system. Recommendation systems help to navigate quickly and receive necessary information. Generally they are used in Internet shops to increase the profit. This paper proposes a quick and intuitive book recommendation...
A system for protecting web resources on web site server is proposed. A few number of protection system have been developed over the past decade. However, because of the insecurity of internet, these traditional systems are quite fragile under the attacks from internet. We propose a protection system for protect the recourses on web site server by combining the hash signature algorithm and digital...
The best strategy for combating SQL injection, which has emerged as the most widespread website security risk, calls for integrating defensive coding practices with both vulnerability detection and runtime attack prevention methods.
Now days, Internet in becoming a basic medium communication either for business or individual life as most countries in the world are applying free internet access. However, absence of proper regulation has lead to social epidemic such as reducing working performance, addiction to pornographic sites and online gamming. Organization, companies and family institutions are fully aware of the current...
Based on the data from the English Majors network-assisted translation and learning in Dezhou University, by employing the questionnaire survey, this paper makes a careful analysis about the assistance of the network from multi-level perspective. According to my related survey, the network has become indispensable in students learning, and however the teachers' guidance and supervision are much needed...
The authors have developed a system to autonomously classify the meanings of words using a knowledge database constructed from sentences found in textual content on Internet websites. This is a totally new system for classifying the meanings of words dynamically using only the connections between words. The authors believe that robots using such a system can approximate the knowledge of humans.
Web sites are often a mixture of static sites and programs that integrate relational databases as a back-end. As they evolve to meet ever-changing user needs, new versions of programs, interactions and functionalities may be added and existing ones may be removed or modified. Web sites require configuration and programming attention to assure security, confidentiality, and trust of the published information...
Development organizations often do not have time to perform security fortification on every file in a product before release. One way of prioritizing security efforts is to use metrics to identify core business logic that could contain vulnerabilities, such as database interaction code. Database code is a source of SQL injection vulnerabilities, but importantly may be home to unrelated vulnerabilities...
Pharming attacks - a sophisticated version of phishing attacks - aim to steal users' credentials by redirecting them to a fraudulent website using DNS-based techniques. Pharming attacks can be performed at the client-side or into the Internet, using complex and well designed techniques that make the attack often imperceptible to the user. With the deployment of broadband connections for Internet access,...
The Reliability Information Analysis Center (RIAC), under contract to the Defense Technical Information Center (DTIC), is developing and implementing a Web-Accessible Repository of Physics-based Models (WARP) database and website to centrally organize and make available information and data on physics-based models. In addition to providing access to available Physics-of-Failure (PoF) model information...
As the popularity of the web increases and web applications become tools of everyday use, the role of web security has been gaining importance as well. The last years have shown a significant increase in the number of web-based attacks. Too many nouns web application security vulnerabilities result from generic input validation problems. Examples of such vulnerabilities are SQL injection and Cross-Site...
Phishing is a kind of online security attack where the attacker creates a replica of an existing web page to fool users in order to hack their personal, financial, or password data. The statistics today reveal that the current Anti-Phishing system has failed to prevent Phishing completely. In this paper an Anti-Phishing algorithm is proposed which is termed as Phish-Secure. Phish-Secure use the concept...
Internet has gained huge popularity over the last decade. It offers its users reliable, efficient and exciting online services. However, the users reveal a lot of their personal information by using these services. Websites that collect information state their practices with data in their privacy policies. However, it is difficult to ensure if the policies are enforced properly in their practices...
Traditional anti-tampering system can not guarantee its own security. in order to reduce tampering and ensure the integrity of Web pages and web server security and the stability of operation, the paper analyzes the current anti-tampering technology of several webs, and introduces the model three-threading technology based on the existing anti-tampering technology and the multi-ring structure of the...
Large amount of labeled training data is required to develop robust and effective facial expression analysis methods. However, obtaining such data is typically a tedious and time-consuming task that is proportional to the size of the database. Due to the rapid advance of Internet and Web technologies, it is now feasible to collect a tremendous number of images with potential label information at a...
Today E-commerce popularity has made web an excellent source of gathering customer reviews / opinions about a product that they have purchased. The number of customer reviews that a product receives is growing at a very fast rate (It could be in hundreds or thousands). Opinion mining from product reviews, forum posts and blogs is an important research topic today with many applications. However, existing...
With the advance of the Internet, e-commerce systems have become extremely important and convenient to human being. More and more products are sold on the web, and more and more people are purchasing products online. As a result, an increasing number of customers post product reviews at merchant websites and express their opinions and experiences in any network space such as Internet forums, discussion...
Automatic document classification is becoming an important research field with the rapid increase of electronic documents. The main purpose of this research is to construct an accurate document classifier based on support vector machines (SVM), which is known as the state of the art algorithm for document classification. The rough null space (RNS) based approach is also known as a good linear approach...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.