The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The advent of a new era of smart objects and networks of things inspired us to present a unified proposal for a model of a smart academic forum. It's an IoT architectural model that spans almost all vital divisions of the academic forum. We present IoT-architecture showing how academic services as well as data records could be delivered in an automated way to make academic life easier. This work elucidates...
This paper presents a framework for internet real-name system development that introduces a new phase in the usual procedure: Active Real-name System and Automatic Security Surveillance. The main goal of this paper is to bridge the gap between the real-name requirement analysis and the internet crime implementation through the generation of a model of the security system architecture plus the security...
Usually content management systems are based on core technologies such as database management systems and file systems. Content management is now being regarded as a base technology for other more complex applications which offer a wide range of functionality for accessing and transforming large data volumes. While content management tasks can be easily implemented using the existing database systems,...
To facilitate rational decision making regarding cyber security investments, decision makers need to be able to assess expected losses before and after potential investments. This paper presents a model based assessment framework for analyzing the cyber security provided by different architectural scenarios. The framework uses the Bayesian statistics based extended influence diagrams to express attack...
Given the wide acceptance of SMS in mobile devices,it has been applied in unconventional applications beyond chating and exchanging short text messages. In this paper, we review a set of unconventional SMS-based applications. We review the basic operation modes in which they act and their needs for security services. Considering limitations on mobile devices, here we propose an architectural model...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.