The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Smartphone carrier companies rely on mobile networks for keeping an accurate record of customer data usage for billing purposes. In this paper, we present a vulnerability that allows an attacker to force the victim's smartphone to consume data through the cellular network by starting the data download on the victim's cell phone without the victim's knowledge. The attack is based on switching the victim's...
In big data environment, the performance of the focused crawler has a great impact on the results of crawling. In order to improve the efficiency and accuracy of focused crawler, this paper proposed a combination method of HTML analysis and text density and multi-reference factors similarity calculation method based on the basic principle and key technologies of focused crawler. The proposed method...
Web browsing response times are affected by the heterogeneous nature of Internet: links with disparate bandwidth, servers and routers with diverse specifications and network segments with particular traffic shaping policies. Also, on a daily basis, several new information systems get connected to the Internet consequently increasing traffic. Aiming to reduce response times, prefetching systems predict...
Websites have become a form of information distributors; usage of websites has seen a significant rise in the amount of information circulated on the Internet. Some businesses have created websites that display services the business renders or information about that particular product; businesses make use of the Internet to expand business opportunities or advertise the services they render on a global...
Memento TimeMaps list identifiers for archival web captures (URI-Ms). When some URI-Ms are dereferenced, they redirect to a different URI-M instead of a unique representation at the datetime. This suggests that confidently obtaining an accurate count quantifying the number of non-forwarding captures for an Original Resource URI (URI-R) is not possible using a TimeMap alone and that the magnitude of...
Users wish to preserve Internet resources for later use. But what is part of and what is not part of an Internet resource remains an open question. In this paper we examine how specific relationships between web pages affect user perceptions of their being part of the same resource. This study presented participants with pairs of pages and asked about their expectation for having access to the second...
Various methods have been proposed for creating and maintaining lists of potentially filtered URLs to allow for measurement of ongoing internet censorship around the world. Whilst testing a known resource for evidence of filtering can be relatively simple, given appropriate vantage points, discovering previously unknown filtered web resources remains an open challenge. We present a novel framework...
The background of this paper is the issue of how to overview the knowledge of a given query keyword. Especially, we focus on concerns of those who search for Web pages with a given query keyword. The Web search information needs of a given query keyword is collected through search engine suggests. Given a query keyword, we collect up to around 1,000 suggests, while many of them are redundant. We cluster...
People are getting more and more conscious and worried about privacy issues that arise when browsing the Web. Ad-blockers, anti-tracking extensions, privacy and anonymity plug-ins, etc. promise to protect users and their privacy from third-party tracking systems. But how effective are they? In this paper, we present the first experimental campaign aimed at benchmarking popular plug-ins for web privacy...
The information industry plays an important role in the current times by the use of ICT information and communication technologies, which allow companies to manage the different ways to interact with their customers in an organized and efficient manner. The present study involves the analysis of the management carried out by micro, small and medium enterprises (SMEs) in Ecuador, in order to interact...
During the past decade, we have witnessed the pervasive penetration of mobile smart devices such as smartphones, tablets, and wearable devices, which significantly enrich Internet applications and improve user experience. In the foreseeable future, mobile smart devices are predicted to take up over 50% of global devices/connections and surpass 4/5 of mobile data traffic by 2021 [1]. Such mobile smart...
Different from general-purpose search engines, vertical search engine only needs to collect and index only a specific knowledge domain, and then provides more professional search services for users. In this paper, we propose a novel library resource vertical search engine based on ontology technology. In the vertical search engine, the information that crawler collects from Internet should be further...
Various malicious methods for a website to get more popularity than it deserves are mainly classed into two types, one of which is link-based spam. Mainstream link-based anti-spam algorithms, including ranking algorithms and spam algorithm only count the number and quality of links of a page to identify a spam page, with some of them using a whitelist or a blacklist. This paper proposed a PageRank-improved...
Nowadays, various network services, such as online shops and reservation of facilities, have been used with the spread of the Internet. Some of these services request to offer personal information to users. However, we cannot know how offered personal information is used. Thus, we feel uneasy to offer personal information to service providers. For this reason, we proposed a framework that a user can...
In the last few years a number of search engines have been introduced which support Arabic language. Explain the reasons of late appearance of search engines that related to Arabic language and pages has appeared because Arabic language is morphological language. While other languages such as English or French are language's affixation. This research aims to develop the Arabic search engine and to...
This article is devoted to methods of improving the efficiency of security systems using Honeypot technology. There are observed basic principles of creating the protection system using this technology. There are suggested methods of web services organization which use affected software to efficiently detect intrusions. There are also given options of collecting statistical information about attacker's...
The working principle of intelligent English translating search engine is discussed in this paper. Then the method of Meta search that is fused with acquired results of each search is analyzed in detail. In the research of fusion results we adopt the optimized scheme which integrates weight and quality method to extract the retrieval results of component search engine, and to perform purification...
Currently Internet usage has increased a lot due to bandwidth availaility and technology advancements. Internet is widely used for knowledge sharing, online review of products etc. Many open forums, blogs are used for this purpose. Since many users are contributing their opinions towards any query submitted by information seeker, there is a possibility of confusion. Often opinions contradict with...
Increase in size and complexity of web pages has challenged the efficiency of HTTP. Recent developments to speed up the web have resulted in two promising protocols, HTTP/2 (RFC 7540) at the application layer and QUIC (multiplexed stream transport over UDP). Google servers are using HTTP/2 and QUIC whereas other major sites like Facebook and Twitter have begun using HTTP/2. In this paper, we compare...
The patent system is a valuable source of information. Millions of patents have been issued and data contained in them is not represented in any other form. However, the usage of these data is not optimal. We believe that contextual data can be very useful in understanding better and using more patent data. This paper reports on developed algorithms, methods and obtained the results in matching patent...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.