The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Stored SQL injection (SQLI) and Stored Cross Site Scripting (XSS) are the top most critical web application vulnerabilities in present time. Previous researches have shown that black-box scanners have relatively poor performance in detecting these two vulnerabilities. In this paper, we analyze the performance and detection capabilities of latest black-box web application security scanners against...
Named Entity Recognition or NER is one of the sub-research field of Information Extraction which can be used for machine translation, question answering, semantic web, etc. One of the biggest challenge of NER is the adversity to construct a manually labeled training data. In this work, we present a semi-supervised approach for Indonesian language NER which is capable of creating high quality training...
The evolution of Internet access technologies, together with the wide diversity of customer devices, has led to a complex scenario where measuring basic metrics with accuracy has become a rather complicated task. Although nowadays there are a lot of tools to assess the rate of Internet speed, most of them share neither the methodology nor the infrastructure to produce comparable results. In this regard,...
Sentiment analysis is a language processing task which is used to find out opinion expressed in online reviews to categorize it into different classes like positive, negative or neutral. The paper aims to summarize the movie reviews at aspect level so that user can easily find out which aspects of movie are liked and disliked by user. Before finding aspect and its respective opinion of movie, proposed...
With the rapid growth of Internet traffic, new emerging network architectures are under deployment. Those architectures will substitute the current IP/TCP network only if they can ensure better security. Currently, the most advanced proposal for future Internet architecture is Named Data Networking (NDN). However, new computer network architectures bring new types of attacks. This paper focuses on...
Multimedia content is increasingly available in multiple modalities. Each modality provides a different representation of the same entity. This paper studies the problem of joint representation of the text and image components of multimedia documents. However, most existing algorithms focus more on inter-modal connection rather than intramodal feature extraction. In this paper, a simple yet effective...
Information in a document can be represented by tags generated by using entity annotation approach. Those tags can be used to organize documents in a collection. This organizing method is also used in a blog to manage their posts. In this study, a WordPress plugin (named Wiki CS Annotation) which implements TAGME's algorithmic technology is designed and developed to perform entity annotation by giving...
University as a research center has a responsibility to commercialize research products. Sebelas Maret University (UNS) is intensively developing featured products. A clinic management application has been developed to be the initial product by the inventor. The clinic management application is already developed in prototype form. The application should be tested before entering the market to determine...
The past decade has seen a lot of research on statistics-based network protocol identification using machine learning techniques. Prior studies have shown promising results in terms of high accuracy and fast classification speed. However, most works have embodied an implicit assumption that all protocols are known in advance and presented in the training data, which is unrealistic since real-world...
This chapter discusses the importance of right combination of words and variations. The wording on a website represents an area where there are virtually inexhaustible opportunities for experimenting with variations. The variations can be crafted with just a few keystrokes, and often the slightest change can have a major effect. The right combination can be leaps‐and‐bounds more effective than the...
The explosion of the number of devices and users on the Internet results in massive amounts of data and information. This poses the most complex challenges in security we have ever faced. The detection of malicious domains and Internet protocol (IP) addresses has been a hot topic in cyber security. We present a scalable and effective graph inference system for detecting malicious domains and IP addresses...
URL redirection is necessary in web applications. Well-designed redirection makes better user experience. However, if used improperly, it could give rise to attacks such as phishing. These improperly used redirections are called Unvalidated Redirects and Forwards (URF). This paper prescribes a mechanism to systemically discover URF vulnerabilities in web applications. The prototype implementation,...
Today network security is major problem faced not only by small companies but big giants like Samsung and Google. Traditional architecture of internet is vulnerable to DDoS attacks and it provides an opportunity to an attacker to get access to a great amount of compromised hosts by using their vulnerabilities to create attack networks or Botnets. Although a number of defense techniques and countermeasures...
Quality analysis is one of the key step to be followed while developing any software or product. While doing research, data being collected is all depends on the way it is collected. In market and research industries data quality is primary factor for research analysis. In this paper, we have developed a parser that will help in quality check of online surveys created in tool named as Qualtrics. In...
As most of the malware nowadays use Internet as their main doorway to infect a new system, it has become imperative for security vendors to provide cloud-based solutions that can filter and block malicious URLs. This paper presents different practical considerations related to this problem. The key points that we focus on are the usage of different machine learning techniques and unsupervised learning...
This paper presents the results of an experiment with focus on comprehension of acceptance test cases in the field of event processing application development. We compare the usage of a semi-structured test specification format proposed by the IEEE and a structured table-oriented format called EPTDL, which has been proposed for automated acceptance testing in the domain of event processing. Our results...
Continuous deployment speeds up the process of existing agile methods, such as Scrum, and Extreme Programming (XP) through the automatic deployment of software changes to end-users upon passing of automated tests. Continuous deployment has become an emerging software engineering process amongst numerous software companies, such as Facebook, Github, Netflix, and Rally Software. A systematic analysis...
Android is one of the most popular open-source smartphone operating system and its access control permission mechanisms cannot detect any malware behavior. In this paper, new software behavior-based anomaly detection system is proposed to detect anomaly caused by malware. It works by analyzing anomalies on power consumption, battery temperature and network traffic data using machine learning classification...
Web application developers have been bothered about cross-browser compatibility problems caused by different kinds of web browsers. Existing techniques and tools commonly compare and analyze screenshots of websites rendering in different browsers. In this paper, we propose a technique for statically analyzing cross-browser compatibility problems. Our approach can easily detect whether web applications...
This paper, utilizing correlation analysis and path analysis methods, researches the impact path of negative Internet word related to the mouth on brand equity and quality through cognitive trust concept by regarding universal consumers as study principal body. This research aims to further promote the IWOM research system in China. The empirical conclusions unveil some relationship: (1) the cognitive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.