Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Network Intrusion Detection Systems (NIDSs) play a crucial role in detecting malicious activities within the networks. Basically, an NIDS monitors network flows and compares it with the pre-defined suspicious patterns. To be effective, different intrusion detection algorithms and packet capturing methods have been implemented. With rapidly increasing network speeds, NIDSs face a challenging problem...
With the rapid development of the Internet, especially in recent years, the development of mobile Internet is increasingly rapid. Message push, which is an important way for mobile client to publish information and make communication, plays a significant role in mobile Internet. MQTT protocol is one of the implementation technologies of message push in Android system with low power consumption and...
Ad-Hoc and Delay-Tolerant Networks (AHDTNs) can be very useful in environments where more traditional networking technologies fail. Determining the practical effectiveness of AHDTNs can however be challenging. We review design considerations and practical experience with a novel mechanism for monitoring and analyzing the performance of AHDTNs. This new mechanism, AllNet Trace, somewhat resembles a...
Tor is an anonymous Internet communication system based on the second generation of onion routing network protocol. Using Tor is really difficult to trace the users Internet activity: this is the reason why the usage of Tor is intended in order to protect the privacy of users, their freedom and the ability to conduct confidential communications without being monitored. Tor is even more used by cyber...
Tools to generate game-based learning materials are seldom implemented in Massive Open Online Course (MOOC) platforms. First experiments with game-based learning MOOCs had shown good results. In my research, I will focus on the integration of game-based learning to the openHPI MOOC platform. The use of game-based learning materials will be evaluated in three iterations: (1) by existing means the platform...
As the use of low-power and low resource embedded devices continues to increase dramatically with the introduction of new Internet of Things (IoT) devices, security techniques are necessary which are compatible with these devices. This research advances the knowledge in the area of cyber security for the IoT through the exploration of a moving target defense to apply for limiting the time attackers...
Pneumatic circular manipulator is an experimental setup which is designed and developed at Faculty of Technical Sciences in Novi Sad, Serbia. It is controlled via Internet, using CEyeClon platform. The goal of realization of the manipulator is ability of participants to remotely use it as a test bed for testing various types of pneumatic control. Remote participants are mainly students of technical...
Currently, complex software (e.g. PDF readers) usually takes various inputs embedded with multiple objects (e.g. fonts, pictures), which may result in bugs. It is a challenge to generate suitable test cases to support fine-grained test to the PDF readers. Compared with the traditional blind fuzzing which does not utilize the information of input grammars, fuzzing with the model of the file format...
Langkawi is one of the most popular tourist destinations in Malaysia, with over 2.5 million tourists visit the island per year. To explore the entire treasure and uniqueness of the island through the easiest way and shortest time, an android-based application is specially built based on the tourism information about Langkawi. Smart Langkawi Tourism is a free download application available in PlayStore...
HTML5 is the latest markup language that includes features to allow developers to do most of the production work throughout the browsers without relying too much on third-party add-ons. HTML5 is always accompanied with JavaScript that gives those browsers the ability to perform the program logic locally. IndexedDB is a NoSQL database supported by HTML5 that is capable of storing JSON objects. In this...
The aim of this paper is to present a heuristic study about the level of usability of 24 universities Web portals using data mining techniques. For experimenting in this work, we used a System for Evaluation of Usability of Web sites (SIRIUS) which contains a tool to generate usability valuations of Web sites called Prometheus and integrates 10 heuristics to do the process. The assessments collected...
A good automated testing tool could reduce as much as possible the manual work done by testers. In order to improve the traditional record-replay approach and reduce the effort that the testers spending on writing test scripts, we propose an approach that generates the Android application test scripts based on accessibility service without connecting to a computer. This approach simulates user input...
Logic Selectivity immensely reduces both number of outages and their duration in the distribution network. IEC 61850 can be applied for standard implementing of Logic Selectivity in which Generic Object Oriented Substation Events (GOOSE) messages should be exchanged between intelligent field devices over the Internet. However, information security and automation requirements must be noted in order...
Monitoring Systems are necessary to track and understand the changes that take place in environments. Remote monitoring and data collection systems are useful and effective tools to collect information from fuel storage tanks. The fuel management system is a monitoring device built on the Raspberry-Pi computer, it takes information about tank's fuel level in real time through its sensor and live streaming...
Run-time malware detection strategies are efficient and robust, which get more and more attention. In this paper, we use I/O Request Package (IRP) sequences for malware detection. N-gram will be used to analyze IRP sequences for feature extraction. Integrated Negative Selection Algorithm (NSA) and Positive Selection Algorithm (PSA), through a selection of n-gram sequences which only exist in malware...
With the development of intelligent technology, Smart Home began to integrate into people's family life, and intelligent technology can provide more ideas for the establishment of a healthy home ecology. In order to better solve the security risks of family ecological environment, maintain the health of families, we analyzes the application and development of wisdom life philosophy, family ecological...
Nowadays, many school teachers start to execute E-testing in classrooms due to its time and labor-saving. It is not easy that teachers want to block access to the Internet for online cheating activities. Therefore, an offline E-testing system is needed. However, existing offline E-testing systems are always developed ad hoc for particular purpose and procedures. This paper presents a general-purpose...
This paper presents the IALP 2016 shared task on Dimensional Sentiment Analysis for Chinese Words (DSAW) which seeks to identify a real-value sentiment score of Chinese words in the both valence and arousal dimensions. Valence represents the degree of pleasant and unpleasant (or positive and negative) feelings, and arousal represents the degree of excitement and calm. Of the 22 teams registered for...
The analysis of the threats of identity theft and infection of websites indicates that antivirals are ineffective for websites, because hosting does not conduct continuous monitoring for viruses on their servers due to large amounts of user data, and RAID cannot save data, because they only duplicate them, and in the case of infection with a virus they merely memorize a changed file. We have developed...
Online experiments are frequently used at internet companies to evaluate the impact of new designs, features, or code changes on user behavior. Though the experiment design is straightforward in theory, in practice, there are many problems that can complicate the interpretation of results and render any conclusions about changes in user behavior invalid. Many of these problems are difficult to detect...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.