The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
User reported experiences and opinions are used by peers to make decisions about where to go and what to buy. Unfortunately, not all users or opinions are honest. Many opinions are fabricated and may be submitted by automated systems or by people who are recruited by businesses and search engine optimizers to write good reviews. Such reviews and ratings are called spam reviews. These are misleading...
Malicious program or malware is a computer program which was written intentionally to harm computing system. Malware protection involves several sub-tasks namely Monitoring, Prevention, Analysis, Detection, Removal and Recovery. This paper proposes a static heuristic based scoring system that gives a maliciousness score to portable executable files. Malicious score can be used at different stage of...
Along with the wide use of web application, XSS vulnerability has become one of the most common security problems and caused many serious losses. In this paper, on the basis of database query language technique, we put forward a static analysis method of XSS defect detection of java web application by analyzing data flow reversely. This method first converts the JSP file to a Servlet file, and then...
Many important network security areas, such as Intrusion Detection System and Next-Generation Firewall, leverage Traffic Classification techniques to reveal application-level protocols. Machine Learning algorithms give us the ability to identify encrypted or complicated traffic. However, classification accuracies of Machine Learning algorithms are always facing challenges and doubts in practical usage...
Opportunistic networks (OppNets) are an interesting topic that are seen to have a promising future. Many protocols have been developed to accommodate the features of OppNets such as frequent partitions, long delays, and no end-to-end path between the source and destination nodes. Embedding security into these protocols is challenging and has taken a lot of attention in research. One of the attacks...
Mobile ad hoc networks (MANETs) are wireless networks which have a wide range applications due to their dynamic topologies and easy to deployment. However, such networks are also more vulnerable to attacks compared with traditional wireless networks. Certificate revocation is an effective mechanism for providing network security services. Existing schemes are not well suited for MANETs because of...
Data aggregation is an efficient way to prolong the lifetime of wireless sensor networks (WSNs) by reducing communication traffic. However, sensor nodes are usually deployed in harsh or hostile environments. They are easy to be malfunctioning or become compromised nodes, which makes the sensor data unreliable and affects the accuracy of data aggregation. This paper proposes a secure data aggregation...
Multi-modal biometrics enjoy more merits than their single-modal counterparts in terms of accuracy performance and security. The fusion of hand-based biometrics such as palmprint and palmvein is straightforward since they can be acquired simultaneously with a customized image acquisition device. Conjugate 2DPalmHash Code (CTDPHC), which is constructed by 2DPalmHash Codes (2DPHCs) of palmprint and...
We present a novel security monitoring framework for intrusion detection in IaaS cloud infrastructures. The framework uses statistical anomaly detection techniques over data monitored both inside and outside each Virtual Machine instance. We present the architecture of our monitoring framework and describe the implementation of the real-time monitors and detectors. We also describe how the framework...
Bag-of-words deception detection systems outper-form humans, but are still not always accurate enough to be useful. In interrogation settings, the language of questions influences the language of responses. We develop a technique to correct for such influences and apply it to question-and-answer datasets. Surprisingly, such correction is not sufficient - those being deceptive react to prompting words...
Cloning attacks threaten radio-frequency identification (RFID) applications but are hard to prevent. Existing cloning attack detection methods are enslaved to the knowledge of tag identifiers (IDs). Tag IDs, however, should be protected to enable and secure privacy-sensitive applications in anonymous RFID systems. In a first step, this paper tackles cloning attack detection in anonymous RFID systems...
Important users are high-status vertices in social networks. They are everywhere in most fields of society and have big impact on those around them. Although a lot of effort has been made on identifying important users, the efficient methods still need to be developed, especially for the web users from Sina microblog, which is the most popular social networking sites in China and has unique characteristics...
Software vulnerabilities are the root cause of computer security problem. How people can quickly discover vulnerabilities existing in a certain software has always been the focus of information security field. This paper has done research on software vulnerability techniques, including static analysis, Fuzzing, penetration testing. Besides, the authors also take vulnerability discovery models as an...
Recent years, society relies heavily on the network infrastructure and information system. Protecting these assets from frequently network attacks needs to deploy some distributed security systems. However the amount of data produced by many distributed security tools can be overwhelming. So it's very difficult and limited to get the most risky alert through manual process based on the huge network...
The complexity of today's networks and distributed systems makes the process of network monitoring difficult. The amount of data produced by many distributed security tools can be overwhelming. So it's very difficult and limited to get the most risky alert through manual process based on the huge network alerts with many attributes, such as asset, priority, reliability, risk, type et al. The common...
Rapid screening requires identifying individuals concealing information promptly and noninvasively. The standard Concealed Information Test (CIT) is not conducive to a rapid screening context, however, researchers are investigating the ability to conduct adaptations of the CIT using noninvasive sensors. The purpose of this paper is to propose a study that will investigate and compare the accuracy...
Corporations that offer online trading can achieve a competitive edge by serving worldwide clients. Nevertheless, online trading faces many obstacles such as the unsecured money orders. Phishing is considered a form of internet crime that is defined as the art of mimicking a website of an honest enterprise aiming to acquire confidential information such as usernames, passwords and social security...
During the past decade, the teachers in the schools have increased their use of Internet-based content and resources in their classrooms. The blended approach combines the best elements of online and face-to-face learning. Blended learning is booming as the education becomes more demand-focused. This paper briefly explains about a system which supports to educate the children in a blundered learning...
Knowledge-based systems (KBS) can potentially enhance individual decision making. Yet, recommendations from these systems continue to be met with resistance. This is particularly troubling in professions associated with deception detection (e.g., border control), where humans are accurate only about half the time. In this research-in-progress, we examine how the fit between KBS explanations and users'...
Previous research [1] has indicated that reputation scores can be used as the basis for trust computation in P2P networks. In this paper, we use reputation scores calculated from P2P search engine rating sites to determine whether a torrent is likely to be linked to a fake file (or not). Our results indicate clear separability between files which are fake and which are genuine, assuming the integrity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.