The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Economic Denial of Sustainability (EDoS) attacks have been threatening cloud consumers' financial viability due to the “pay-as-you-go” cloud resource charging scheme. EDoS attackers can take advantage of this pricing scheme to fraudulently consume the billable cloud resources from the cloud consumers and thus, drive up the cloud consumers' financial cost and eventually disrupt their economic sustainability...
With the Internet becoming the dominant channel for business and life, web proxies are also increasingly used for illegal purposes such as propagating malware, impersonate phishing pages to steal sensitive data or redirect victims to other malicious targets.,,,,In this paper, using thousands of web proxy URLs crawled, we performed a large-scale study on the DOM (Document Object Model) structure features...
A content delivery network (CDN) is composed of several edge servers which are distributed in different regions and provide web objects locally. If a web client sends one request to an edge server that has no available cache, i.e., cache miss, this edge server must download web objects from other edge servers or the origin server and then store into the cache. In this paper, we study and implement...
In this paper, we develop a method to encapsulate and embed interactive 3D volume rendering into the standard web Document Object Model (DOM). The package we implemented for this work is called Tapestry. Using Tapestry, data-intensive and interactive volume rendering can be easily incorporated into web pages. For example, we can enhance a Wikipedia page on supernova to contain several interactive...
In recent years, the Linked Open Data (LOD) have been attracting attention in the world as the technology that can construct the semantic Web. The LOD are created based on the Resource Description Framework (RDF), and can link each of resources considering semantic relations. However, there are problems that the LOD do not have enough links between resources, and the LOD need a lot of time for creation...
The article considers the most popular methods of data collection from socially oriented websites. There were reviewed specialized software for information search and analysis from social networks. Advantages and disadvantages of manual social network analysis as well as automated software are shown. Main stages of socially oriented websites analysis using API and source code analysis are described.
With an average reading speed of 200–500 words per minute, at least human takes 2 to 3 minutes to read and understand one news in online media. The number of news updates on an online media in a few minutes can be a lot and it's time-consuming if a reader has to read the contents of all the news. Reading a summary that represents the main idea of the news can be a solution to save time. This study...
With the widely application of distributed systems, to solve the Sessions information sharing between various servers is becoming increasingly important. Meanwhile, multiple clients also have to tackle the problem of Session information sharing. The traditional Session method conducts information sharing via information replication. But, to a high degree, it has become the bottleneck of browse speed...
Online advertising involves an advertiser, who provides the advertisements to be displayed on the publisher's content and a publisher, who integrates advertisements into his online content. The existing advertising systems do not support regional languages in India. The number of local language internet users is growing at 47% year-on-year in India. There is no provision from Google AdSense to give...
SQL Injection Vulnerability (SQLIV) has been the top-ranked threat to the Web security consistently for many years. Penetration tests, which are a most widely adopted technique to detect SQLIV, are usually affected by testing inaccuracy. This problem is even worse in inferencebased, blind penetration tests for online Web sites, where Web page variations (such as those caused by inbuilt dynamic modules...
Digital documents are likely to have problems associated with the persistence of links, especially when dealing with references to external resources. People keep track of various webpages of their interest using distributed digital collections and without possession of these documents; the curator cannot control how they change. In the current context, managing these distributed digital collections...
Various methods have been proposed for creating and maintaining lists of potentially filtered URLs to allow for measurement of ongoing internet censorship around the world. Whilst testing a known resource for evidence of filtering can be relatively simple, given appropriate vantage points, discovering previously unknown filtered web resources remains an open challenge. We present a novel framework...
We use the ServiceWorker (SW) API to intercept HTTP requests for embedded resources and reconstruct Composite Mementos without the need for conventional URL rewriting typically performed by web archives. URL rewriting is a problem for archival replay systems, especially for URLs constructed by JavaScript, that frequently results in incorrect URI references. By intercepting requests on the client using...
In this paper we show a new remote lab software architecture for Automatic Control Education. This architecture is based on Node.js and Easy Java/JavaScript Simulations, which make it lightweight and accessible from smart devices like smartphones or tablets. It is easily adaptable to different types of controllers and experiments, as the existing labs at the University Complutense of Madrid show.
Web crawlers have been misused for several malicious purposes such as downloading server data without permission from the website administrator. In this paper, based on one observation that normal users and malicious crawlers have different short-term and long-term download behaviors, we develop a new anti-crawler mechanism called PathMarker to detect and constrain persistent distributed crawlers...
Web pages at present have become dynamic and frequently changing, compared to the past where web pages contained static content which did not change often. People have the need to keep track of web pages which are of interest to them, using bookmarks in the web browser and continuously keep track of them in order to get the updates. Tracking changes which occur in these bookmarked web pages and getting...
As websites have become bulkier and serve more larger files to end users, it has become harder for the HTTP/1.1 protocol to provide adequately short page load times. The HTTP protocol, in its previous versions, is a generic stateless application protocol most often used for distributed, collaborative, hypermedia information systems. The newest version, HTTP/2, introduced an updated protocol feature...
Controlling home appliances by controlling electrical or electronic appliances remotely, things can be done automatically in the desired environment. Very first few implementations of Automation included simple security systems like alarms, but today automation can be applied in every system of gadgets. Using Home automation can make you do some very important things very easily and with higher controllability...
WWW is, by far, the enormous database in the world, holding humongous amount of data of various types that would be consumed by users for various needs. It contains priceless data for businesses, if mined effectively. Web mining is a process that targets to find useful information or knowledge from the Web page contents, hyperlink structure, and usage or sever logs of websites. Web data mining is...
We consider a timing-only based attack against encrypted and padded web traffic. The attacker can collect training data, but only over a different connection from that against which the attack is directed. This is a significantly easier to perform attack than one which depends on training data collected over the victim link. We demonstrate that an attacker can infer the correct web page >87% of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.