The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Twenty-First Century has seen the dawn of the Internet as a pervasive medium by which nearly all information flows. However, the permissive environment in which the Internet was founded fostered a community plagued by Internet trolls, individuals who deliberately post inflammatory, off-topic, or offensive material on online message boards to elicit angst, or other emotions, from their targets...
To address the challenges raised by the Internet usage evolution over the last years, the Content-Centric Networking (CCN) has been proposed. One key feature provided by CCN to improve the efficiency of content delivery is the in-network caching, which has major impact on the system performance. In order to improve caching effectiveness in such systems, studying the functioning of CCN in-network storage...
Internet Exchange Points (IXPs) play a key role in the Internet architecture, enabling cost-effective connections among multiple autonomous systems (ASes). The management of IXP networks includes the activity of taking care of elephant flows; they represent a small number of the total flows of an IXP, but have high impact on the overall network traffic. Managing elephant flows involves adequate identification...
Community of Inquiry (CoI) model is a framework with socio-constructivist roots, which describes an online learning community on three interdependent components: cognitive presence, social presence and teaching presence. Content analysis is widely used to examine transcripts of computer mediated conversations between students in a community of inquiry. However, there are no dedicated support tools...
Existing access control strategies for Internet of Things cannot provide good flexibility, robustness or quick response. We propose an access control approach of finer granularity and techniques supporting bulk operation to make interaction in IoT more flexible. Also, a decentralized strategy and data centric network techniques are used to enhance the system robustness and swiftness. We implement...
Used by both information systems designers and security personnel, the Attack Tree method provides a graphical analysis of the ways in which an entity (a computer system or network, an entire organization, etc.) can be attacked and indicates the countermeasures that can be taken to prevent the attackers to reach their objective. In this paper, we built an Attack Tree focused on the goal “compromising...
Pneumatic circular manipulator is an experimental setup which is designed and developed at Faculty of Technical Sciences in Novi Sad, Serbia. It is controlled via Internet, using CEyeClon platform. The goal of realization of the manipulator is ability of participants to remotely use it as a test bed for testing various types of pneumatic control. Remote participants are mainly students of technical...
This study was based on the validated Users' Information Security Awareness Questionnaire (UISAQ). Authors gathered information on risky behavior and security awareness among 355 pupils from three secondary schools: General program secondary school (Gymnasium), Business and administrative high school and Trade school. Aim of the study was to test adapted version of UISAQ questionnaire on secondary...
The article provides results of a research study on safety of children on the Internet, and on use of the information-telecommunication technology (ICT) from the aspect of safety. The study was conducted on the elementary school children using paper or web-based questionnaires. It involved 1,232 students from grades one through eight of elementary school (approximately 400 students per survey), ages...
In this paper we investigate factors that affect excessive use of Internet among elementary school students in Vojvodina. The quantitative analysis was performed using datasets from research carried out in 66 elementary schools across Autonomous Province of Vojvodina. Using a large data set on elementary school students, we have tried to describe the profile of students who excessively use Internet...
The opportunities provided by the information and communications technology, with a special emphasis on the Internet, have become an integral part of life. However, are we sufficiently aware and prepared as individuals, nations or the international community for the threats coming from cyberspace or for the denial of the use of that dimension of communication, commerce and even warfare? Namely, despite...
The degree of including information, knowledge and technologies into all human activities is very high. New skills for new society are not only classical literacy (reading, writing, counting), but also information competencies and digital/computer literacy. According to ACM Europe Working Group in our “digital world”, information is available anywhere at any time, computer power is ubiquitous, communication...
In this study is explored the changing path of e-Learning discipline since its appearance to nowadays. E-Learning has evolved in different ways in different sectors therefore it might have different implications in certain periods of time in certain sector. A small number of things have changed in the last half century as much as the way we learn. Consequently, a significant research is going on throughout...
Internet of Things (IoT) connect different types of devices to control different things or simply read data from then, such as room temperature, location, pressure and others, in a variety of application domains using the World Wide Web. This is a challenge for technology and Information Security (IS). Therefore, this paper surveys advances in IoT-based with an eye towards security, where discusses...
Caches are often employed to better manage the ever-growing amount of global Internet traffic. Particularly, reverse proxies are often used to free up congested peering links and reduce inter-domain traffic. In addition, caches place content close to the edge, leading to lower latency which can be beneficial for many applications. In an effort to bring content even closer to end devices, home routers...
The information security discipline devotes immense resources to developing and protecting a core set of protocols that encode and encrypt Internet communications. However, since the dawn of human conflict, simple traffic analysis (TA) has been used to circumvent innumerable security schemes. TA leverages metadata and hard-to-conceal network flow data related to the source, destination, size, frequency,...
Smart home is a house that uses Internet of Things(IoT) to monitor the environment, control the electric appliances and communicate with the outer world. Smart home is a complex technology, but a developing one. A smart home automation system has been developed primarily because in today's time and world, everybody's in a surge and wishes to screen and get to everything without being there physically...
In this paper we investigate a Persian search engine log and present a comprehensive analysis of question queries in three levels: structure, click and topic. By analyzing question queries characteristics, we explore behavior of Persian language users. Our experimental results show that question queries length are larger than normal queries. Most of these queries contained question words "How"...
Big data technology is used to integrate, clean up and analyze the data of student management system, educational administration system, and campus card consumption system and so on in this paper. The characteristics of high risk students are extracted and selected, and the prediction model is constructed, which can be used to predict the high risk students scientifically, reasonably and effectively,...
Fraud has existed long before the advent of modern technology; however, we can increasingly observe how this profit-driven enterprise is entering the cyberspace. Our paper focuses on a case study of two scam schemes targeting international students at Penn State. The scams have been perpetrated in either a physical (i.e., phone scam) or online (i.e., Craigslist scam) form. However, this dichotomy...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.