The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditional manual pressure test requires a lot of testers and clients and has difficulty in reproducing errors. Automatic test methods are also used in the test and simulation of trunking system. However, the protocol of trunking system is stateful, some testing methods like packet playback are not suitable for the test of trunking system. This paper presents a design of Domain Specific Language...
Online experiments are frequently used at internet companies to evaluate the impact of new designs, features, or code changes on user behavior. Though the experiment design is straightforward in theory, in practice, there are many problems that can complicate the interpretation of results and render any conclusions about changes in user behavior invalid. Many of these problems are difficult to detect...
The software development industry has adopted written and de facto standards for creating effective and maintainable unit tests. Unfortunately, like any other source code artifact, they are often written without conforming to these guidelines, or they may evolve into such a state. In this work, we address a specific type of issues related to unit tests. We seek to automatically uncover violations...
This paper introduces the attack detection performance comparison between two famous firewall systems, Endian and pfSense. The non-paid unrestricted versions with basic default configuration were set up to be attacked from the outside network. The attack scenarios included port scanning, ping of death, flooding, and password attack in different conditions. The results showed that pfSense performance...
Distributed Denial of Service (DDoS) attacks and defence against them poses great challenge in network security. Studying of DDoS mitigation strategies, understanding of secure state of a network as well as the testing of defense appliances is the main purpose of our testbed. The testbed is based on a P2P grid-Our Grid environment and aids to run DDoS attacks on existing nodes of P2P grid to use spreading,...
Instant messaging activity plays a major role in our life. With increasing usage of mobile phones and instant messaging users, vulnerabilities against these devices raised exponentially. In this paper, we propose a security analysis testing for secure instant messaging apps in Android which is designed using a threat analysis, considering possible attack scenarios and vulnerabilities specific to the...
With the advent of Web 2.0 application, and the increasing number of browsers and platforms on which the applications can be executed, cross-browser incompatibilities (XBIs) are becoming a serious problem for organizations to develop web-based software. Although some techniques and tools have been proposed to identify XBIs, a number of false positives and false negatives still exist as they cannot...
This paper presents the real time evaluation of the dynamic tariff (DT) method for alleviating congestion in a distribution networks with high penetration of distributed energy resources (DERs). The DT method is implemented in a real time digital testing platform that emulates a real distribution network. The platform returns power system status that indicates the efficiency of the DT method in a...
In presented paper we describe a design and implementation of an information system based on base of embedded client and Linux application server architecture. Presented information system serves for remote collection, storing and processing information on the number of carried out mechanical cycles for group of older existing fatigue test machines in an automotive components production. This upgrade...
The architecture of remote Education Resource Center for the students of engineering on the basis of data space is developed. The consolidated data catalog and the query processing schemes in data space are proposed.
Cloud Computing is storing of data and application on remote servers and accessing them via internet rather than installing and saving them on your personal computers. Growing volume of scientific data sets which are publicly available has made it impractical to move data to desktop for analysis. To solve these issues we require a new computing paradigm. In recent years, cloud computing has grown...
This paper discussed one application of IOT as media data transmission for the electrocardiogram (ECG) signal. We developed ECG monitoring system that can be accessed by several users simultaneously via the internet network. The system consists of ECG hardware, transmission module based on Zigbee and web server for data storage and web application. The ECG signal taken from body's patients is acquired...
Online auctions are now an immensely popular component of the electronic marketplace. However, there are many fraudulent buying/selling behaviours that can occur during an auction (e.g., shill bidding, bid shielding, etc.). While researchers are proposing methods for combating such fraud, it is extremely difficult to test how effective these countermeasures are. This is primarily due to it being unethical...
Websites typically include many forms or web elements that allow users to enter and submit data. This data will be eventually executed in the back-end databases. Users can, intentionally or unintentionally enter improper input data that, if reach those back-end databases, may cause some serious security or damaging problems. For proper user interface design as well as for security reasons, it is important...
Very large data sets within the range of megabytes to terabytes generated daily from checkpoint-and- restart processes are seen in today's scientific simulations. Reliability and durability are two important factors to build an archive storage system. Erasure code based object storage systems are becoming popular choices for archive storage systems due to cost-effective storage space saving schemes...
As one of the basic data resources of Internet, IPv4 address is the most important identity for terminal users to access online resources. With the development of modern Internet, more and more intelligent applications need the terminal's geolocation information to supply high quality services. How to locate the geolocation of the source IP address has become a very important topic in Internet research...
In a sophisticated and coordinated cyber-attack $100 million has been stolen from Bangladesh's account. Attackers introduced malicious code remotely into the Bangladesh Bank's server, which allowed them to process and authorize the transactions. Advanced attack techniques poses threats to all web application systems. Cross Site Scripting (XSS) and Cross Site Request Forgery (CSRF) are two vulnerabilities...
Third-party measurements of cloud availability are needed as a checkpoint of cloud providers' quality statements, and ICMP has been proposed to carry on such measurements. Simple ICMP-based measurement schemes, however, provide a poor discrimination between false outages and true cloud outages, unless the cloud outage probability is quite higher than the packet loss rate incurred by probing packets...
This paper discusses a new online tool for online gamers to share networking performance results and to produce aggregate networking performance reports generated from the data reported by all users. It is necessary to improve the quality of service and make online games faster. This will help improve latency sensitive game data collection. It will help to improve gaming performance through the global...
AngularJS, the new Javascript framework, with wide usage across web browsers and great expression power, comes with a shortcoming — lack of compiler optimization. Consequently it is strongly recommended that every application written in JavaScript, regardless of the used framework, should include tests that validate both its behavior and performance. This paper presents and evaluates two popular web...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.