Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Web activities are big data revealing the thoughts and intentions of users. Every file that is downloaded, and each searching word in the search engine are thought as reflections of the user's tendencies. Web activities are used to analyze in traces of crime in all kinds of information systems such as computers and mobile phones which are electromagnetic optical devices. The use of smart systems or...
As the number and variety of cyber threats increase, it becomes more critical to share intelligence information in a fast and efficient manner. However, current cyber threat intelligence data do not contain sufficient information about how to specify countermeasures or how institutions should apply countermeasures automatically on their networks. A flexible and agile network architecture is required...
Generation of diagnostic communication (GDC) is an important task in the area of computer networks that is used in various circumstances. For example, it is used for the purpose of testing networking hardware, such as routers or switches, for analyzing and benchmarking of networking systems or web services. Although there are various solutions using GDC, typically, they are specialized for generation...
Segment Routing (SR) can be used as a traffic engineering strategy to counteract increasing loads on networks like Internet Service Provider (ISP) backbones. Many SR approaches, however, optimize traffic flows that were measured in the past. This paper introduces a new tunnel training architecture. It aims to show that the results of these strategies can still be beneficial for routing new traffic...
Network Address Translation (NAT) allows multiple devices with private addresses to share one public address. NAT was mainly confined to home gateways, but with the exhaustion of the IPv4 address space, large-scale NATs have been deployed. Other technologies causing large-scale address sharing are on the rise as well (e.g. VPNs). Large-scale address sharing is problematic, since it limits the number...
While many DDoS mitigation approaches utilize the flexibility of software-defined infrastructures in a decentralized fashion, most of them assume that the infrastructure as a whole is willing and capable of mitigating all incoming packets of an attack. Those approaches cannot be used out of the box, if the attack overburdens the infrastructure or the monetary budget for mitigation is limited. Therefore...
This paper reviews digital forensic phases and problems in evidence analysis phase and smart methods in this area. Among these phases, studies on the evidence analysis phase are examined. In the analysis of electronic evidences, use of smart methods and their development will contribute to information technology law and improvement of digital forensic devices. Effective evidence analysis both provides...
With the development of Internet technology, Automatic Train Supervision (ATS) simulation system with traditional C/S architecture is more and more inconvenience for its incompatibility with internet and the high cost of maintenance and development. It is more practical to use B/S structure. However, computer interlocking(CI) system with ATC system using UDP protocol is not compatible with remote...
This paper presents a real-time Kvazaar HEVC intra encoder for 4K Ultra HD video streaming. The encoder is implemented on Nokia AirFrame Cloud Server featuring a 2.4 GHz dual 14-core Intel Xeon processor and Arria 10 PCI Express FPGA accelerator card. In our HW/SW partitioning scheme, the data-intensive Kvazaar coding tools including intra prediction, DCT, inverse DCT, quantization, and inverse quantization...
Prefix hijacking is a serious threat in the Internet routing landscape. The Border Gateway Protocol has no origin authentication by design. Countermeasures, e.g. on-top authentication as implemented by R-PKI infrastructures, are not yet deployed on a very large scale. Being victim of prefix hijacking is a difficult situation with few options. Not only the owner of a prefix is victim but all the networks...
A method for increased risk assessment of annual cases of acute respiratory viral infection using single-time immuno-epidemiological study data is proposed. Mechanisms of impact of immunity indicators, health status, and factors of environmental pollution on individual morbidity of a chemical industry employee are studied and predicted in affiliation with the risk group. The method can be recommended...
The size of router forwarding tables is a critical aspect of the quality of a network design. Oversized forwarding tables not only force enterprises to purchase expensive hardware, which is a significant operational cost, but also make issues such as power consumption and heat generation more prominent. The size of forwarding tables is a direct result of the IP prefix assignment scheme. Unfortunately,...
We study the computational complexity of short sentences in Presburger arithmetic (SHORT-PA). Here by short we mean sentences with a bounded number of variables, quantifiers, inequalities and Boolean operations; the input consists only of the integer coefficients involved in the linear inequalities. We prove that satisfiability of SHORT-PA sentences with m+2 alternating quantifiers is SigmaP_m-complete...
In many manufacturing application the system reliability performance is a key issue in order to obtain the best performance of the equipment. The paper focuses on the reliability enhancement of complex systems containing redundant architecture using the Reliability Importance (RI) methods in order to evaluate the weight of each element on the whole system reliability. The first part of the paper is...
In addition to in-house applications, networked enterprises are increasingly using data and services from various external sources. Conversion of data to useful information and IT alignment with business goals are big challenges faced by these enterprises. Integration platforms (IPs) aid enterprises in solving such challenges. However, the large number of commercial and academic IPs currently available...
Tor, uses a protocol aimed at ensuring anonymity by distributing its communication over relays all over the world. This protocol designed to protect the privacy of Internet users from traffic analysis attacks launched by an adversary. The studies in the literature have shown that some attacks can be performed in the hidden service relays, or in exit nodes of services by eliminating anonimity. In this...
This study includes what the concept of IoT (Internet of Objects) expresses conceptually. It is stated that there are three generally accepted layers even though IoT does not have a complete layer structure. These layers are; Object layer, Network layer and Application layer. In addition, the most common security epidemics at IOT are; Botnet, Man in the Middle Attacks, Social Engineering, Data and...
With the development of Internet, network protocol became increasingly complex. This brought a sharp increase in network traffic based on these protocols. How to implement the efficient identification of network protocols has been a problem of network development. In this paper, we focus on protocol identification based on traffic analysis. The theme is that we just need to analysis the headers of...
In most existing remote-control services for ECHONET Lite devices, a controller outside the home network can be used to control ECHONET Lite devices in the home network using a remote-control support server installed on the Internet. However, if the service provider ends the service, a user cannot control these devices from outside the house. This paper proposes a secure end-to-end remote-control...
A distributed system is presented for the monitoring and control of the primary variables: pressure, level and flow; for this, a wireless system is implemented at the level of sensor-actuators and at the level of controllers an Ethernet / IP network, the mentioned industrial networks are implemented based on the OSI model and TCP / IP respectively, for the visualization an HMI is realized in the software...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.