The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the last years, governmental bodies have been futilely trying to fight against dark web marketplaces. Shortly after the closing of "The Silk Road" by the FBI and Europol in 2013, new successors have been established. Through the combination of cryptocurrencies and nonstandard communication protocols and tools, agents can anonymously trade in a marketplace for illegal items without leaving...
Information hiding technology is a hot spot in information security, and is applied in the fields of digital multimedia copyright protection and secret communication. According to the analysis of the characteristics of browser in parsing HTML of the web page and the little capacity available for information hided in web page, a new efficient web page information hiding method with tag attributes has...
Classification Data Mining (DM) Techniques can be a very useful tool in detecting and identifying e-banking phishing websites. In this paper, we present a novel approach to overcome the difficulty and complexity in detecting and predicting e-banking phishing website. We proposed an intelligent resilient and effective model that is based on using association and classification Data Mining algorithms...
This paper presents a novel approach to overcome the difficulty and complexity in detecting and predicting e-banking phishing website. We proposed an intelligent resilient and effective model that is based on using association and classification Data Mining algorithms. These algorithms were used to characterize and identify all the factors and rules in order to classify the phishing website and the...
Theoretically, e-customers gain more benefit than traditional customers as they can access products and services 24-hours a day from anywhere in the world. However, practically, e-business has not been accepted in spite of its availability and the increased number of internet users in developing countries such as in the Middle East. National cultures combined with other factors affect user acceptance...
The blog search engine Technorati made a survey in November 2008 and the results showed that the index volume of blogs was as high as 133 million. In view of the increasing number and influence of blogs, their quality assessment has become a topic worth stressing and exploring. In this study, both quantitative and qualitative methods are used to construct a multi-stage scale development procedure,...
Users tend to use functional and usable products more frequently. It is also possible that a functional software is not usable or vice versa. Only functionality-focused designs fail to meet usability needs. Therefore, both usability and functionality, which in software design are interrelated, should be taken into account in the design processes. In addition, meeting users' requirements is one of...
This paper presents a field study on Web security vulnerabilities from the programming language type system perspective. Security patches reported for a set of 11 widely used Web applications written in strongly typed languages (Java, C#, VB.NET) were analyzed in order to understand the fault types that are responsible for the vulnerabilities observed (SQL injection and XSS). The results are analyzed...
In the last decade, substantial progress has been made in Internet and Web-based technologies. Applications related to education, health care, banking, or even social actions between individuals and groups, can highly benefit with the use of these technologies. However, computer attacks can drastically compromise web users' privacy. The spreading of Spyware in Internet applications is a proper example...
This paper focuses on reducing consumers' perceived risk through Website service quality cues in C2C e-commerce trading. It reveals a negative correlation between consumers' perceived risk and Website service quality in C2C E-commerce trading, and explores the internal composition of this relationship. Functional, physical, service, and psychological risks are found to be negatively affected mainly...
This paper developed a conceptual model through a survey of literature on e-service, and then it has a demonstration analysis of the world's largest online bookstore in China Dangdang.com. The study measured the impact of four dimensions on e-satisfaction and funds the relationship between e-satisfaction and e-loyalty. According to their relationship, it will give a hand to the online bookstore manager...
Content-based phishing detection extracts keywords from a target Web page, uses these keywords to retrieve the corresponding legitimate site, and detects phishing when the domain of the target page does not match that of the retrieved site. It often misidentifies a legitimate target site as a phishing site, however, because the extracted keywords do not charecterize the legitimate site with sufficient...
According to acquiring data from the meta-search engine and getting information in specific websites, the author proposes an extraction model based on Web information which is used to construct network relationships of the subject based on its semantic link. Then based on the proposed model above, the author does content mining and semantic analysis on the Web data of five big cities (Beijing, Shanghai,...
Many Websites on the Internet are based on database, especially Websites which use database to display the pages actively such as ASP, PHP and JSP. However, because of SQL attack, people pay much attention to the security of database on the Internet. Different from many protection systems deployed between Web servers and Internet, this article designed a database protection system between Web server...
Web 2.0 applications such as blogs, wikis and social networking sites have challenging privacy issues. Many users are unaware that search engines index personal information from these sites and offer public access to collected data. As a consequence, privacy invasions are rampant. In this paper, we demonstrate that tag-based privacy policies are a usable and flexible privacy control method for Web...
With the increasing of the amount of Internet information, there are different kinds of Web crawlers fetching information from websites at anytime, anywhere, some of which are fetching information normally and some are attacking Web sites based upon application level and then causing the breakdown of servers, For a Web site, how to distinguish different kinds of crawlers effectively and accurately...
5th GrC model is the formal model specified into the category of sets. It is a theory of ordered granules, namely, granules are ordered ldquosubsetsrdquo of the universe, We extract a 5th GrC model from a set of Web pages. A granule is a high frequent sequence of keywords, It is a tuple in a relation and naturally carries some concept expressed in Web pages. The concept analysis in this paper is about...
This paper describes a set of innovative attribute based checks for defending against phishing attacks. We explain a number of anti-phishing algorithms implemented as plugins and highlight which attributes of phishing sites they consider.To assess the effectiveness and applicability of this prototype,we performed extensive experimental testing. We present a fully automated crawling framework that...
Phishing Web pages present a previously underused resource for information on determining provenance of phishing attacks. Phishing Web pages aim to impersonate a legitimate Web site in order to trick their potential victims into revealing their confidential data, such as usernames and passwords. However different phishing Web pages often contain small differences and these differences can provide...
Comparison shopping agents are Web applications that can help on-line shoppers to find the optimized value for commodities and/or services by parsing product descriptions. Adaption of mobile agent system, which has capability of effectively supporting the distributed applications in open and heterogeneous environments, is best suited for comparison shopping agent implementation. The major goal of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.