The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Abstract-Cyber-bullying has recently been reported as one that causes tremendous damage to society and economy. Advances in technology related to web-document annotation and the multiplicity of the online communities renders the detection and monitoring of such cases rather difficult and very challenging. This paper describes an online system for automatic detection and monitoring of Cyber-bullying...
Autor stara się rozwikłać dylemat związany z realnym i etymologicznym pojmowaniem bezpieczeństwa, jego konwencjonalnym i często polisemantycznym definiowaniem, a naturalnym i istotowym określaniem. W rozwikłaniu tym wskazuje na dwa rodzaje nazw wyróżniane już przez Platona i Arystotelesa, a mianowicie : konwencjonalne i naturalne. Stąd analityka semantyczna i objaśnienie pomieszczone w następnych...
The proposal presented in this paper is a combinationof two approaches, i.e classification of Non-FunctionalRequirements for improving the quality of the software productand reducing the efforts of the analysts in identifying requirementsentences manually from the Software Requirements (SRS) Specificationdocuments, with the help of rule-based technique usinglinguistic relations. Classification results...
Organizations rely on security experts to improve the security of their systems. These professionals use background knowledge and experience to align known threats and vulnerabilities before selecting mitigation options. The substantial depth of expertise in any one area (e.g., databases, networks, operating systems) precludes the possibility that an expert would have complete knowledge about all...
The preventive maintenance requirement of test equipment is determined by the reliability centered maintenance (RCM) analysis. In the first step of RCM analysis procedure, the important degree evaluations of test equipment play a significant way to identify the functionally significant item (FSI) list. To evaluate the important degree of test equipment, a systematic methodology integrating the fuzzy...
In this paper trustworthiness evaluation issue of cloud provider is considered. A new architectural approach for the trust assessment system is proposed. According to the approach the cloud provider's trust level is calculated by aggregating provider's risk and reputation values. For the demonstration of the capabilities of the proposed method the experimental tests are conducted in Matlab program...
Assessing E-commerce web sites quality is essential not only to have recommendations for improvement but also to make comparisons with competitors. In this paper, the aim is to know the best criteria for the evaluation and obtain a weight for them using fuzzy Analytic Network Process (fuzzy ANP). The subjective judgments of the decision maker are expressed by fuzzy numbers. The decision making problem...
Traditional access control systems lack the ability to cope with dynamic environments where several factors can affect the decision-making process. On the contrary, Risk-based access control systems offer a preeminent alternative where multiple risk factors sway the access control decision. Nonetheless, risk is often measured qualitatively, and is subject to uncertainty, thus, making it susceptible...
Dealing with issues related to safety of Nuclear Power Plants (NPPs) is of high importance and priority for assuring nonstop energy production. To enhance safety, modernization and upgrade of the aging installations by incorporating automation processes is unavoidable for many reasons, among them, environmental protection and lifetime extension of currently operating NPP. In that context, Human Machine...
MOOC environments seem to offer massive potential for social learning. However, MOOC environments have unique challenges for pedagogy which are not present in other socio-constructivist learning environments: the scale and diversity of participation. Many points of view are accessible, but few means of filtering. This paper examines interaction data from several MOOCs. Interaction data is an indicator...
This paper presents a fuzzy based modeling approach for determining the effectiveness of IT security policies of an organization. Normally organizations have different IT security policies, but modeling and maintaining them is a tedious process. In order to ensure appropriate IT support policies, there are many factors involved. The most common are the periodic data backups and prevention against...
We present an outline of the field of Multilevel Design Understanding by first defining and motivating the related problems, and then describing the key issues which must be addressed in future research.
Today incident detection mechanisms, that define CERT / CSIRT effectiveness, based mostly on two principles — signature and heuristic. Their disadvantage is that they are focused on mathematical models, which require a lot of time to prepare statistics and so it decreases CERT/CSIRT efficiency. In this work, we have proposed approaches to ensure CERT / CSIRT high efficiency and its evaluation. To...
Network-selection decision for a multimode terminal having multiple classes of simultaneous handoff calls (such as file download and video session) can be made independently for the individual calls or jointly for the group of calls. Existing radio access technology (RAT) selection algorithms developed for making network-selection decisions for singles calls are not suitable for making network-selection-decisions...
The cross-listing mechanism enables that companies collect funds and investors invest in capital markets of foreign countries. Among the objectives are the increase in the liquidity, the reduction of the risk and of the capital cost. In this context, this paper analyses the relationship of dually listed stocks of Brazilian companies, simultaneously traded on the São Paulo stock Exchange and New York...
In this paper, we propose and evaluate a new fuzzy-based reliability system for Peer-to-Peer (P2P) Communications in JXTA-Overlay platform. In our system, we considered four input parameters: Number of Authentic Files (NAF), Local Score (LS), Number of Interactions (NI) and Security (S) to decide the Peer Reliability (PR). We evaluate the proposed system by computer simulations. The simulation results...
Cloud computing represents the next evolutionary step in the realm of IT and offers a multitude of advantages over traditional computing models. However, there is a large trust deficit between cloud service users (CSUs) and cloud service providers (CSPs) that prevents the widespread adoption of the cloud among business professionals. Businesses are reluctant to migrate to the cloud due to the numerous...
In service oriented computing, authentication factors have their vulnerabilities when considered exclusively. Cross-platform and service composition architectures require a complex integration procedure and limit adoptability of newer authentication models. Authentication is generally based on a binary success or failure and relies on credentials proffered at the present moment without considering...
Service migration is an important approach for service availability and system survivability in a security incident. When a system is under attack and some platforms have been compromised, the services executed on those platforms must be migrated to other platforms in order for them to be continuously provided to users. Service migration strategy is the guideline and high-level decision regarding...
In this paper, we propose and evaluate a new fuzzy-based reliability system for Peer-to-Peer (P2P) Communications in JXTA-Overlay platform. In our system, we considered three input parameters: Number of Interactions (NI), Security (S), Packet Loss (PL) to decide the Peer Reliability (PR). We evaluate the proposed system by computer simulations. The simulation results have shown that the proposed system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.