The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article is devoted to methods of improving the efficiency of security systems using Honeypot technology. There are observed basic principles of creating the protection system using this technology. There are suggested methods of web services organization which use affected software to efficiently detect intrusions. There are also given options of collecting statistical information about attacker's...
Gathering the most relevant data for one's need, from the huge collection of data in the internet is a work of great difficult. To make it easier, we propose an application called text clustering, which is an automatic grouping of text documents into clusters, so that documents within a cluster defines the similarity between them, but they are not similar to documents in other clusters. Most of existing...
In this paper we are showing a financially savvy and effortlessly implementable i-voting (web voting) framework particularly for India in view of adhoc network. The essentials of cognitive radio innovation and Adhoc organize in view of cognitive radio technology are initially presented. The idea of smart i-voting framework is then proposed and how it can be executed in suburban region where web services...
Malware is an international software disease. Research shows that the effect of malware is becoming chronic. To protect against malware detectors are fundamental to the industry. The effectiveness of such detectors depends on the technology used. Therefore, it is paramount that the advantages and disadvantages of each type of technology are scrutinized analytically. This study's aim is to scrutinize...
Today, web browsers are used to access and modify sensitive data and systems including intranets and critical control systems. Due to their computational capabilities and network connectivity, browsers are vulnerable to several types of attacks, even when fully patched. Browsers are also the main target of phishing attacks. Many browser attacks, including phishing, could be prevented or mitigated...
Early detection of any exceptional behavior coupled with comprehensive analysis of related data can significantly reduce performance bottlenecks and outages in any system. Collating the relevant data points and establishing correlation between them to provide an abstract view of potential hotspots has been a challenge in any large multi-tier systems. This paper describes a framework that shall enable...
Adequate healthcare has always been a topic of concern in Bangladesh. As the population of Bangladesh is increasing exponentially, it has become impossible to deliver proper healthcare to all of its residence. For that reason alternate resources for healthcare have become almost a necessity today. Modern world is driven by technology and electronic healthcare system can be the solution we are looking...
Online banking is getting popularity due to location independence, 24/7 services and responsiveness. Financial services through the internet are running under various threats like phishing, pharming (cyber attack intended to redirect a website's traffic to another fake site), malware, Man-In-The-Middle (MITM) attack and the evolving sophistication of compromise techniques. One time password (OTP)...
We consider the problem of estimating the latency of a feasible but unused Autonomous System-level path on the Internet. This problem arises in evaluating the overhead incurred by censorship and surveillance circumvention schemes that alter the Internet routing infrastructure, and the cost of attacks against such schemes. Since these paths are not advertised by the current routing infrastructure,...
From 2004 to 2016 the Leipzig Linguistic Services (LLS) existed as a SOAP-based cyberinfrastructure of atomic micro-services for the Wortschatz project, which covered different-sized textual corpora in more than 230 languages. The LLS were developed in 2004 and went live in 2005 in order to provide a webservice-based API to these corpus databases. In 2006, the LLS infrastructure began to systematically...
Geolocation databases are widely used for mapping Internet devices' IP address to the physical location. However, there are inconsistencies between them. It is difficult to avoid because the methodology used by database provider to gather their geographic information is different. Moreover it is impossible to update database in real time. Yet by analyzing inconsistencies between geolocation databases,...
Since the amount of information submitted and made public about tourist spots in urban areas is very large compared to that for regional tourist spots, it is difficult for people who do not have much knowledge of or acquaintance with the places concerned to efficiently obtain information necessary for taking tourist trips. This study aims to develop a social recommendation media GIS (Geographic Information...
The patent system is a valuable source of information. Millions of patents have been issued and data contained in them is not represented in any other form. However, the usage of these data is not optimal. We believe that contextual data can be very useful in understanding better and using more patent data. This paper reports on developed algorithms, methods and obtained the results in matching patent...
Critical infrastructure, which used in energy, industry, and financial area, is one of essential components for modern society. Thus, critical infrastructures and its availability must be kept secure. Inspecting cyber threat is needed to prevent cyber-attack on critical infrastructure. By using OSINT (Open Source INTelligence) process, it is possible to gather meaningful intelligence related to security...
Internet is a very rich resource of documents that need to be analysed to extract their sentimental values. Sentiment Analysis which is a subfield of Natural Language Processing discipline focuses on this issue. The existence of sentiment lexicons in their own language is a very important resource for scientists studying in sentiment analysis field. Since many studies of sentiment analysis have been...
Future Internet has been a hot topic for the last decade. One of the approaches put forward in order to revise the Internet architecture is LISP – Locator/ID Separation Protocol, which leverages the separation of the identifier and the locator roles of IP addresses. Contrary to the classical push model used by the BGP-based routing architecture, LISP relies on a pull model. In particular, routing...
In this work, we describe the design, development, and deployment of NEREA (Named Entity Recognizer for spEcific Areas), an automatic Named Entity Recognizer and Disambiguation system, developed in collaboration with professional documentalists. The aim of NEREA is to keep accurate and current information about the entities mentioned in a local repository, and then support building appropriate infoboxes,...
Digital forensic evidence acquisition speed is traditionally limited by two main factors: the read speed of the storage device being investigated, i.e., the read speed of the disk, memory, remote storage, mobile device, etc.), and the write speed of the system used for storing the acquired data. Digital forensic investigators can somewhat mitigate the latter issue through the use of high-speed storage...
With the increase of the number of college graduates, the country needs to do much in promoting their employment. Meanwhile as the rapid development of Internet lead to explosive growth of information, the real value needs to be effectively and immediately selected to benefit both employers and employees. This paper aims to propose two content based algorithms, one starting with cold boot and the...
The proposed NMS, called ITB NMS, is a web-based centralized management system used to manage and monitor the current condition of the entire existing network infrastructure clearly and concisely. ITB NMS is used to monitor a device or devices connected to the network-based LAN, WAN or Internet. ITB NMS is able to monitor the condition of a device or monitor the activities being performed by a device...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.