The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the communication systems, Adaptive Neuro-Fuzzy Interface Systems (ANFIS) are used for the detection of unauthorized user access and forecasting product demand for 3G and 4G mobile phones. The Paper proposes ANFIS for identification of quantity of servers in a teletraffic system. Combinations of teletraffic performance parameters are defined for synthesis of the structure of the neuro-fuzzy classifier...
MySQL is the most trusted and depended-on open source database platform in use today. Many of the most popular and highly-trafficked websites in the world are built on MySQL because of its ubiquity across heterogeneous platforms and application stacks and for its well-known performance, reliability and ease of use. Research, publications and community service is one activity that is managed by the...
This paper describes the journey of adapting Agile-Scrum in a project, referred here as Global Configurator Project (GCP), where the project members are distributed across locations in Germany, India, and U. S. Here, we will be discussing about the practices like new taxonomy on scrum roles, scaling scrum with actually using Scrum of scrums and evolving cross-functional multi-skilled and self-managed...
Gathering and analyzing statistic information is essential for every college or university, which cares about their students. This paper aims at giving theoretical overview of modern web page development and statistics gathering methods, analyzing present state of TUKE and designs a new statistics system, where emphasis is placed primarily on comfortable work of students with the system.
In the last few decades, the performance analysis of multi-server has become a research hotspot. We consider a distributed server system in which heterogeneous servers operating under the processor sharing(PS) discipline. In this system, when a stream of users' requests arrive at a dispatcher, it will dispatch each user to different servers respectively. In this paper, we analyze the performance of...
Active exploitation of the previously proposed Set Top Box testing framework has given rise to new requirements such as remote monitoring of test execution. The system described in this paper is web-based and receives periodic updates of each registered test station, thus being a real-time web application. The system displays the video output of each tested device as an MJPEG stream. The large number...
Wireless Sensor Networks (WSNs) are already employed in numerous applications including military, industry, and health. Considering the inherent limitations in WSNs, the security is a critical issue in WSNs. The declared security functions of each device should be well verified. In this paper, a security testing method based on security level is proposed for WSNs. Meanwhile, an experimental security...
MongoDB is one of the most popular NoSQL database nowadays. It is an open-source document-oriented database with flexible schema. To increase performances, it can easily scale both vertically and horizontally. For horizontal scaling, MongoDB uses auto-sharding technique to divide data and distribute it over multiple machines. However, in this technique, a DB administrator must choose a shard key for...
As the attacks on the website and domain names are increasing day by day it becomes very important for various verticals in the country to be secured against the deadly attacks which can hamper the operations of the web traffic in the country and its verticals. XSS is one such attack which is more frequently tried on the websites to gain information and data which is relevant to the attacker from...
Stored SQL injection (SQLI) and Stored Cross Site Scripting (XSS) are the top most critical web application vulnerabilities in present time. Previous researches have shown that black-box scanners have relatively poor performance in detecting these two vulnerabilities. In this paper, we analyze the performance and detection capabilities of latest black-box web application security scanners against...
The system adopts C/S structure as the system structure, using JSP as a developing platform, Microsoft SQL Server database. At the same time, the whole system is developed combined with the basic theory of project management information system development, structure and basic principle and system developing steps. The system not only includes policy information entering, generating and managing compensation,...
SQL injection attack (SQLIA) is one of the most severe attacks that can be used against web database driving applications. Attackers' use SQLIA to get unauthorized access to and perform unauthorized data modification. To mitigate the devastating problem of SQLIA, different researchers proposed variety of web penetration testing tools that automation of SQLI vulnerability assessment that result in...
The web today is a growing universe of interlinked web pages and web apps, teeming with videos, photos, and interactive content. Over time web technologies have evolved to give web developers the ability to create new generations of useful and immersive web experiences. The most important technology in realizing this shift is Ajax (Asynchronous Javascript and XML). Ajax is a major breakthrough in...
Network emulation strikes the balance between using real machines on full-fledged networks and running software models of applications and networks in simulation environments. Advanced Linux features make it possible to emulate entire networks on a single machine, enabling experiments that are much easier to run and repeat. However, some of these features were not designed with the primary purpose...
Dynamic taint analysis has been widely used in software testing, debugging, vulnerability detection and other fields. A popular idea is that we can combine dynamic taint analysis with symbolic execution techniques or fuzz techniques forming the testing framework to test automatically. When testing large applications which costs longer time, a distributed system can be very practical. However, the...
Soft keyboard is perhaps the most common human input device on smartphone. This study designed and implemented a proof-of-concept soft keyboard keylogger in Android. The soft keyboard app was designed to have the capability to capture keystrokes from user and save it. It also can record the GPS location of user at the time of typing and sent it to a remote server. From our testing, the app was capable...
With the increased connectivity of computer devices including mobile devices to the Internet, the volume as well as the type of information that moved through organization network perimeter are also growing significantly. Consequently, this has heightened information security threats to organizations that rely on the Internet to do their businesses. On the other hand, Intrusion Detection System (IDS)...
Keylogger is a dangerous device that can capture all word that typed on the keyboard. There are two kinds of keylogger, it is hardware and software keylogger. It is very easy to detect them because both of them already listed as a malware. There are a lot of antivirus application that can detect software keylogger and for the hardware keylogger, it is easily can be seen if there is a strange thing...
The increasing number of construction of houses in Indonesia would lead to an increase in the number of national electricity consumption. Electricity usage should be done more efficiently so that electricity is not wasted in vain. The development of today's information technology should be used as a solution to these problems. In this research tries to create a system that can be used to simplify...
Migrating to the cloud is becoming a necessity for the majority of businesses. Cloud tenants require certain levels of performance in aspects like high availability and service rate and deployment options. On the other hand, Cloud providers are in constant pursuit of a system that satisfies client demands for resources, maximizes availability, minimizes power consumption and, in turn, minimizes the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.