The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Smartphone carrier companies rely on mobile networks for keeping an accurate record of customer data usage for billing purposes. In this paper, we present a vulnerability that allows an attacker to force the victim's smartphone to consume data through the cellular network by starting the data download on the victim's cell phone without the victim's knowledge. The attack is based on switching the victim's...
Signature-based Network Intrusion Detection Systems (NIDS) are an integral part of modern network security solutions. They help to detect and prevent network attacks and intrusions. However, they show critical performance problems in today's high speed networks. Filters have been proposed to reduce the amount of traffic to be analyzed by a NIDS, yet, such filters need to be very carefully designed...
The revolutionary network that totally changed how the humankind life, the Internet, is now evolving into the Internet of things; which is being achieved by fetching the network connectivity to legacy industrial or commercial devices, as well as everyday objects. This connectivity may be an Internet connection, where the Internet protocol and related technologies are in use. But, there are also many...
The amount of data circulating on the Internet is increasing day by day. With the increasing use of social media in particular, the importance of analyzing these data is increasing. The use of machine learning approaches to analyze large amounts of data is still popular today. Today, the social network Facebook is the most popular social networking sites. In this study, some data taken on Facebook...
With the rapid development of the Internet, especially in recent years, the development of mobile Internet is increasingly rapid. Message push, which is an important way for mobile client to publish information and make communication, plays a significant role in mobile Internet. MQTT protocol is one of the implementation technologies of message push in Android system with low power consumption and...
In most existing remote-control services for ECHONET Lite devices, a controller outside the home network can be used to control ECHONET Lite devices in the home network using a remote-control support server installed on the Internet. However, if the service provider ends the service, a user cannot control these devices from outside the house. This paper proposes a secure end-to-end remote-control...
Software defined networking (SDN) technology promises a new bright future to IP network. Significant number of SDN researches have been done so far to facilitate network operation and management efficiently. However, until now there are only few frameworks to support emulation, verification, and implementation of the SDN. Mininet is one of the most popular tools because of the openness, cost effectiveness,...
The Web is witnessing an exponential growth of distributed and heterogeneous educational material. This hampers distinguishing among contents of these materials, as well as their retrieval. While information retrieval and classification mechanisms concentrate on corpus analysis, annotation approaches either target specific formats or require that a document follows interoperable standards. Rather...
As the worldwide demand for cybersecurity-trained professionals continues to grow, the need to understand and define what cybersecurity education really means at the college or university level. Given the relative infancy of these efforts to define undergraduate cybersecurity programs, the panelists will present different perspectives on how such programs can be structured. They will then engage with...
Cloud computing has recently become an extremely useful facet of modern distributed systems. Some of its many applications lie in the development of web services, its federation with the Internet of Things (IoT) and services for users in the form of storage, computing and networking facilities. However, as more services start utilizing the Cloud as a viable option, security concerns regarding user...
Accessing the Internet through Wi-Fi networks offers an inexpensive alternative for offloading data from mobile broadband connections. Businesses such as fast food restaurants, coffee shops, hotels, and airports, provide complimentary Internet access to their customers through Wi-Fi networks. Clients can connect to the Wi-Fi hotspot using different wireless devices. However, network administrators...
The SSL protocol has been widely used for verifying digital identities and to secure Internet traffic since the early days of the web. Although X.509 certificates have been in existence for more than two decades, individual user uptake has been low due to the high cost of issuance and maintenance of such certs. This has led to a situation whereby users are able to verify the identity of an organization...
This paper is based on the experiences with implementation of information systems within preparation to deal with crisis situations in terms of crisis management in the Slovak Republic with Introduction to the state of the art, the Unified Information System of Economic Mobilization and Development in Slovakia of the Program and Information System — EPSIS®JISHM. We also focus on new challenges in...
With the rapid development of computer networks, a variety of network applications continue to emerge, resulting in a surge of network data traffic. Therefore, the network congestion becomes more serious. Congestion control is facing many problems, including latency, fairness, stability and so on, especially the instability of the network caused by transmission delay. We introduce the traditional...
This paper proposed a solution of Multi-frequency band 6LoWPAN accessing to IPv6 Internet based on the research of wireless sensor network, 6LoWPAN standard and IPv6 network. Furthermore, combining with the multiplexing technology and the TUN/TAP technology, this paper proposed a uplink and downlink packet scheduling mechanism oriented to the multi-packet concurrency problem and realized it in the...
This paper introduces sparse low-power sensor networks using passive seismic sensors for crowd-aware smart buildings, resulting in an “Internet of Ears (IoE)” that can hierarchically detect human footsteps, estimate walk direction, and track person position. An energy-based thresholding footstep detector was developed using wavelet transform for pre-filtering the noise-prone ambient vibrations detected...
Intrusion Detection Systems (IDSs) are signature-based software tools that provide mechanisms for detection and analysis of network intrusions. Using an experimental scenario and real traffic collected at a higher education institution in Brazil, we evaluate the performance of Snort and Suricata IDSs for detection of current Distributed Denial-of-Services attack (Slowloris). Our study has found the...
Internet of Things (IoT) has revolutionized the traditional Internet where only human-centric services were offered. It has enabled objects to have the ability to connect and communicate through the Internet. IoT has several applications such as smart water management systems. However, they require high energy-efficient sensor nodes that are able to communicate across long distance. This motivates...
Based on the existing research of Chinese text clustering, this paper proposes an improved algorithm for the optimization of short term semantic clustering based on social media. The method of weighted factor is introduced to optimize text distance formula and related mathematical proof, the calculation process optimization design from text, written text distance calculation algorithm, the simulation...
This paper presents results of a survey that explored the challenges low-income mobile users of Dhaka, Bangladesh (N = 131) face in mobile text entry. Results revealed that all users use the Bengali language at some capacity to compose text, yet many (are forced to) write with the Roman alphabet. Both feature phone and smartphone users feel that the existing text entry techniques are difficult to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.