The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network attack graphs are a type of analysis tool that can be used to determine the impact that security vulnerabilities have on the network. It is important, then, for attack graphs to be able to represent enough information to aid this analysis. Moreover, they must be able to handle and integrate new vulnerabilities that are being discovered by the security community. We developed a prototype tool...
In this study, we present a method for extracting and representing knowledge of presentation slide creators based on the slide contents that are published on a slide sharing service. The proposed method regards the number of views, downloads, and likes from other users as the users rating for a presentation slide, and extract knowledge of the slide creator in terms of the usefulness and knowledge...
Recruitment and selection of new employees rank to the important processes of human potential management and development. Especially the process of employee selection prepares proper conditions for a successful work performance and decides on a future progress-ability of the organizations. In a unique sector of private security, the precise realization of employee selection can solve one of the most...
This paper proposes an attack pattern mining algorithm to extract attack pattern in massive security logs. The improved fuzzy clustering algorithm is used to generate sequence set. Then PrefixSpan is used to mine frequent sequence from the sequence set. The experimental results show that this algorithm can effectively mine the attack pattern, improve the accuracy and generate more valuable attack...
Nowadays, the attacks on the Internet are becoming more complex, advanced and concealed. A large number of security threats arise. The signature-based detection technology is efficient and simple which is widely used for malicious codes detection system. In this paper, we firstly focus on the principle of the method, and summarize the specific steps to implement it, especially feature extraction,...
Web data acquisition is the foundation of Web data mining. Web crawler is an important tool for Web data acquisition, but the frequent updates of Web data structures, data sources and distribution channels, resulted in high costs of crawler program development and maintenance. In order to solve this problem, this paper designed and implemented an intelligent dynamic crawler, which stored the data...
The identification of vulnerabilities relies on detailed information about the target infrastructure. The gathering of the necessary information is a crucial step that requires an intensive scanning or mature expertise and knowledge about the system even though the information was already available in a different context. In this paper we propose a new method to detect vulnerabilities that reuses...
Many studies analyze issue tracking repositories to understand and support software development. To facilitate the analyses, we share a Mozilla issue tracking dataset covering a 15-year history. The dataset includes three extracts and multiple levels for each extract. The three extracts were retrieved through two channels, a front-end (web user interface (UI)), and a back-end (official database dump)...
The growing crime rate of any country is always one of the biggest obstacles to its growth and development. With more manpower it certainly helps to keep the crime rate at bay, but is manpower the ideal solution? No. This may come as a surprise that despite Big Data being the boom of the century is yet to take firm roots when it comes to helping solve a Criminal Investigation. With the aim of changing...
SQL Injection attack is a kind of attack to a web application that accesses the database of the web application illegitimate. Along with the increasing use of web applications, the database where stores much sensitive information became more and more valuable and vulnerable. Eventually, SQL Injection attack has become rank one in top ten vulnerabilities as specified by Open Web Application Security...
Hiding High Utility Sequential Patterns (HUSPs) is the task of finding the ways how to hide high utility sequential patterns appearing in sequence databases so that the adversaries cannot discover them after hiding. It has become an important research topic in recent years and has been applied in various domains such as business, marketing, stock, health and security, etc. However, few methods have...
In recent years, the use of smart devices is becoming increasingly popular. All kinds of mobile applications are emerging. In addition to the official market, there are also many ways to allow users to download the mobile app. As unidentified instances of malware grow day by day, off-the-shelf malware detection methods identify malicious programs mainly with extracted signatures of codes, which only...
The information construction plays an essential role in the area of public security. However, the “Information Silo” phenomenon in Public Security Department has become a bottleneck of the development of public security. The paper proposes a novel approach to implement a public security knowledge navigation system, utilizing the information extraction to obtain the ontology for the topic maps of public...
Information Mining has wide applications in various sector, like bank sector, medical field and various research centers. Cloud computing has most used in now a days. Request is one of the usually used assignments as a piece of data mining applications. Security is the main part of the cloud computing and it has difficult to handle. Two fields now a day has most useful. As far back as decade, because...
Software Vulnerabilities have been a major concern for enterprises for evaluating vulnerabilities of their software products. For assessing vulnerabilities there are various sites to look upon and search for exposures related to various software products. When vulnerability is detected and exposed on vulnerability database; discovery, analysis and redressal through manual intervention is too moderate,...
We have entered in data deluge already. Data Deluge means data generated by IoT devices and humans simultaneously. The data deluge is a Big threat for technologist but beneficial for end users. Now the coming problem is the security of this data. Big Data is too big, too fast and too diverse that does not compile with traditional data base system. Traditional data base systems are very good to analyze...
Business critical web applications are the most popular services provided to the client by the financial sector. These applications are bringing handsome revenue for the financial industry every year. These services are also a frequent target of attackers. Poor coding practice leads applications to vulnerability that are exploited by attackers. Information and privileges such as access to databases,...
The boundary devices, such as routers, firewalls, proxies, and domain controllers, etc., are continuously generating logs showing the behaviors of the internal and external users, the working state of the network as well as the devices themselves. To rapidly and efficiently analyze these logs makes great sense in terms of security and reliability. However, it is a challenging task due to the fact...
Many democratic countries choose their representatives through electronic elections. Even being a modern tool, its results can be explored maliciously. Because that, many instruments and protocols are using to protect electronic elections from attacks. This work propose a new system to improve the security in electronic elections. It is based on analyses of behavior voter to detect urns with dissonant...
Staying informed about security vulnerabilities, work-arounds and the availability of patches regarding the components of a given system is crucial to ensure system security. Several channels can be used to the monitor the new vulnerabilities publications, but these channels are scattered. We propose in this paper a vulnerability monitoring system based on twitter analysis that aggregates and analyses...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.