The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Internet, Web 2.0 and Social Networking technologies are enabling citizens to actively participate in “citizen science” projects by contributing data to scientific programs. However, the limited expertise of contributors can lead to poor quality or misleading data being submitted. Subsequently, the scientific community often perceive citizen science data as not worthy of being used in serious...
Despite many incidents about fake online consumer reviews have been reported, very few studies have been conducted to date to examine the trustworthiness of online consumer reviews. One of the reasons is the lack of an effective computational method to separate the untruthful reviews (i.e., spam) from the legitimate ones (i.e., ham) given the fact that prominent spam features are often missing in...
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends of mobility (portable devices like Laptop, smart phones and iPads etc), ubiquitous connectivity (wireless or through 3G connectivity) and this trend increases as more and more web-based applications are made available over...
Fraud is increasing with the extensive use of internet and the increase of online transactions. More advanced solutions are desired to protect financial service companies and credit card holders from constantly evolving online fraud attacks. The main objective of this paper is to construct an efficient fraud detection system which is adaptive to the behavior changes by combining classification and...
The following topics are dealt with: autonomic event computing; user-provided networking; broadband single carrier; HeterWMN mobile networks; HeterWMN wireless sensor networks; femtocell networks; exploiting shared media; aerial channel analysis and physical data links; handover and network selection in future broadband networks; performance modelling; coding for memories; cognitive radio, VANET and...
Today E-commerce popularity has made web an excellent source of gathering customer reviews / opinions about a product that they have purchased. The number of customer reviews that a product receives is growing at a very fast rate (It could be in hundreds or thousands). Opinion mining from product reviews, forum posts and blogs is an important research topic today with many applications. However, existing...
In the midst of a social networking revolution, social media has become the new vehicle for effective business marketing and transactions. As social aspects to the Internet continue to expand in both quantity and scope, so has the security threat towards enterprise networks and systems. Many social networking users also become main targets of spams, phishing, stalking, and other malware attacks that...
In modern online multi-player games, game providers are struggling to keep up with the many different types of cheating. Cheat detection is a task that requires a lot of computational resources. Advances made within the field of heterogeneous computing architectures, such as graphics processing units (GPUs), have given developers easier access to considerably more computational resources, enabling...
In the recent past, there have been frequent reports on privacy violations by service providers on the Web. The providers are overstrained with the legal implications of processing personal data. Data-protection authorities in turn are overburdened with the enforcement of the regulations. Users themselves typically cannot identify those violations, due to missing expertise in data-protection law....
The Internet banking service provides convenience, providing rapid development in the world. However, it still causes a number of security problems including hacking. In order to strengthen security, the financial institutions have provided such authentication methods as the official authentication certificate, the security token, the security card and OTP. However, the incidents related to hacking...
Security is an important issue for building and sustaining trust relationship in cloud computing and in the usage of web-based applications. Consequently, intrusion detectors that adopt allowable and disallowable concepts are used in network forensics. The disallowable policy enforcers alert on events that are known to be bad while the allowable policy enforcers monitor events that deviate from known...
Due to the development of internet rapidly, the secure transmission of information has become more and more importance. Until now, there are many scholars study in the topic of data hiding. Specially, the reversible data hiding scheme catch the researcher's attention. No matter how the researchers use the different technology to embed the secret information, they always try to increase the hide space...
The following topics are dealt with: user behavior; intention aware computing; Internet LAN based RFID; intrusion detection system; document analysis; Web service; search engine; machine learning; neural network; collaborative communication; virtualized server; collaborative learning; video summary; computer simulation; fingerprint image matching; data analysis; Bayesian network; text visualization;...
In this paper, we are discussing the question of removing fake multimedia content files, intentionally manipulated by a group of attackers. By employing un-biased collective intelligence of P2P nodes, we identify and remove fake multimedia content files based on the reputation management. The proposed scheme determine the reputation value according to trustworthy (along with confidence) of multimedia...
How will information from online banks influence the choice of customers? This research uses information processing theory, WOM theory, perceived risk theory and trust theory, in order to find the flow of information from online banks to customers, and the relationships among those issues. Moreover, online banks in Mainland China are the targets of this research.
The system of WebMail content and attachments recovery can monitor the network without affecting the performance of the network, check the network for confidential information leakage phenomenon. if found it will store the leak records into the hard disk automatically which will be used as evidence for security sectors. This paper introduces in detail the design and implementation of the WebMail content...
The following topics are dealt with: database technology; pattern clustering; data mining; data security; Internet; image processing; neural nets; wireless sensor networks; telecommunications computing; geophysics computing; traffic engineering computing; video signal processing; computer aided instruction; satellite communications; and electronic commerce.
With the increased complexity, malicious faults have become an important reasons that affect the reliability of the distributed system, especially the web-scale infrastructures, i.e. Amazon S3, Google AppEngine etc. Most such systems assume benign fault model which can't depict the malicious actions. The goal of Byzantine Fault Tolerance protocol (BFT for short) is to mask the malicious behaviors...
Leslie Lampor proposed the theory of Temporal Logic of Actions(TLA),which can express model program and logical rules in one language at the same time. Secure Electronic Transaction(SET) is an secure protocol for e-commerce, Based on the open network and paying with credit card. The agreement defines the whole process of the internet transactions. And it has a complete authentication. Based on the...
For accessing Internet, a reusable password method is frequently used because of its simplicity. This reusable password method is very vulnerable. In recent years, with the explosive growth of the Internet user, user passwords are often incorrect handled and this attestation system is very dangerous. To solve these vulnerability problems of the attestation system, the one-time password, biometric...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.