Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Encryption is often not sufficient to secure communication, since it does not hide that communication takes place or who is communicating with whom. Covert channels hide the very existence of communication enabling individuals to communicate secretly. Previous work proposed a covert channel hidden inside multi-player first person shooter online game traffic (FPSCC). FPSCC has a low bit rate, but it...
The use of Bluetooth Low Energy (BLE) recently became famous in crowd localization services. In this article we show that such service induces significant threats and we propose a scheme that achieves privacy preserving crowd localization. Crowd localization applications leverage all their users to perform periodic BLE scan and detect the nearby tracked devices. The users run a smartphone application...
In this paper, we describe a new teaching approach whose objective is to implement entrepreneurship-based learning. The proposed teaching approach is essentially a project-based approach, but, with two novel key components that give it the entrepreneurship emphasis. First, the main idea is to divide students into groups of four or five members and have each team go through the process of starting-up...
In this practical experience report we discuss a court case in which one of the authors was expert witness. This UK civil case considered possible fraud in an online product promotion competition, with participants being denied prizes because they were considered to have cheated. The discussion in this paper aims to provide a practice-led perspective on the link between technology and legal issues...
Threats to information security can have great impact on business finances and company's reputation. Traditional methodologies for evaluating the maturity of data centers investigate security parameters to determine the compliance of data centers and international security norms. This paper proposes two innovative evaluation procedures to capture other security perspectives on data center environments:...
In this paper the notion of vending and the main tasks of a modern vending company are disclosed, one of the main goals of which is to provide as many payment methods as possible. Vending machines are most often located in large companies, large offices, institutions, and enterprises. The aim of the vending company is to increase the speed of customer service. This paper describes own development...
Modern approaches to the creation of expert systems were considered. Also, the main prospects for the development of expert systems that work on the basis of neural networks were considered.
The current state of the problem of distributed attacks aimed at denial of service is investigated, the last DDoS attacks are monitored. The most popular type of DDoS attacks continues to be httpflood. The modern methods of diagnosing DDoS-attacks are investigated. Positive and negative aspects of these methods were identified.
Web cookies are ubiquitously used to track and profile the behavior of users. Although there is a solid empirical foundation for understanding the use of cookies in the global world wide web, thus far, limited attention has been devoted for country-specific and company-level analysis of cookies. To patch this limitation in the literature, this paper investigates persistent third-party cookies used...
The problem of the discovery and marketing of new drugs can be vastly accelerated through High Performance Computing (HPC), molecular modeling techniques, and more specifically by means of the techniques commonly named as computational drug discovery (CDD) and in silico high throughput screening. These techniques usually assume a unique interaction site (active site) between potential drugs and a...
The electricity retail market nowadays still remains more or less enclosed. Massive family end-users could only purchase electricity from grid companies. The opportunities of being an electricity retailer are hardly available as they are tightly seized in grid companies hands. However, this rigid scheme is promising to be shifted with the deployment of household electricity storage devices, distributed...
A standardized Communication / Information Protocol is necessary for implementing the 4 upper digitalization layers of Industrie 4.0-compliant solutions. OPC UA is one of the leading and preferred technology. Currently, there are many different OPC UA implementations available on the market. This paper gives an overview of existing solutions and shows the results of an initial benchmarking based on...
Cloud-based ERP (Enterprise Resource Planning) Platform is a tendency to facilitate collaboration across Small and Medium-sized Enterprises (SMEs) in the industrial supply chain. However, fast and smooth accessibility to the cloud resource is a vital challenge due to efficiency, reliability, security and other critical issues. This paper presents the development of a mobile application by using web...
System landscapes within logistical scenarios is highly heterogenic. Adding specific mechanisms, e.g. to support planing, monitoring and analyses for fully electrical powered vehicles, could become a mess or at least a challenge. While our project Smart City Logistic (SCL) is trying to manage this extension for multiple logistic scenarios, other projects want to do comparable system extensions as...
In this paper, we first define a new security problem, named mPSI (many-to-one private set interaction), which can find applications in many scenarios where the host of a big database may be queried by a large number of clients who have small-size queries and want to prevent both the intentions and results of their queries from being exposed to others. We also propose a new scheme to solve the mPSI...
In some industries, recruiting qualified resources can be a problem for SMEs, one option is to start a transformation process, and move from a traditional team to a distributed team, gaining access to a much larger base of possible human resources and business opportunities. Digital transformation can be used to help SMEs in taking the steps needed to become distributed companies. This paper shows...
The pressure to maintain (or increase) the level of competitiveness in companies leads to an ever-increasing requirement for effective management supported by the variety of existing resources, which tend to interfere into the work of the manager. Particularly, in the case of waiting queues, the most relevant aspect is the combination of the number of multitasking servers assigned to attend and the...
As a company grows, its infrastructure naturally must grow to support it. The resulting mountains of infrastructure metadata contain valuable information on the health and wellbeing of a company's systems. For example, an abnormally low disk write rate to a file server may indicate that a regularly scheduled task has failed to start. The hypothesis of this case study is that such metadata streams...
Cloud Environment allows enterprises to scale their application on demand. Microservice design is a new paradigm for cloud application development which is gaining popularity due to its granular approach and loosely coupled services unlike monolithic design with single code base. Applications developed using microservice design results in better scaling and gives extended flexibility to the developers...
Demand response is considered as a valuable functionality of the power grid and its potential impacts continue expanding with grid modernization. Colocation data centers (simply called colocation) are recognized as a notably promising resource for demand response due to their high power demand and remarkable potential in demand management. A major challenge of colocation demand response is the split...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.