Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Energy fuels the growth and development of any country, and as such effective monitoring, measurement, billing and access control is imperative. This paper presents a device that uses the evolving Internet of Things (IoT) technology in the design and implementation of an Internet based prepaid energy meter often referred to as smart meters. The energy measurement and billing system is automated. The...
The term of smart electric power refers to utilization of information networks for the intelligent management of power systems. In particular, constraints in the physical layer may be compensated by capabilities uniquely offered by information technologies. This paper frames itself in the area of smart electric power systems, where information driven tools are utilized for implementing electricity...
Internet of things (IoT) is internetworking of various physical devices to provide a range of services and applications. IoT is a rapidly growing field, on an account of this; the security measurements for IoT should be at first concern. In the modern day world, the most emerging cyber-attack threat for IoT is ransomware attack. Ransomware is a kind of malware with the aim of rendering a victim's...
During research analysis of connection problems was made. It has been studied and determined the relationship between theory and graph analysis of social networks. Database was created. Betweenness centrality and centrality was used in prototype.
The actual task of research and development of methods and means for processing data in intellectual information systems forming content with the use of the classification, mathematical and software means and a generalized system architecture. The necessity for development of methods and means of processing data in intelligent information systems forming content by improving system architecture in...
Nowadays content delivery network is a modern wide spread tool to distribute media content to end users via the Internet but still we have no generally accepted way to estimate its efficiency. This paper is devoted to the description of information-theoretic approach for performance estimation of such systems. The keynote of the method is a calculation of a special characteristic suggested which indicates...
Qos of broadband network is important. ISPs have some methods for evaluate it. But they are not efficient enough. This paper present a new method in which delay and scale of windows of TCP messages are used for evaluating performance of broadband. Comparison between delay or scale of window s of samples is the core idea of the method. There are two kinds of comparison. One is absolute terms of above-mentioned...
Hybrid broadcast-broadband TV (HbbTV) is a global initiative that brings new solutions to world of digital television (DTV) in terms of entertainment. In comparison to previous initiatives, different services are additionally provided in HbbTV. This paper describes an application for displaying of hybrid Electronic Program Guide (EPG) for a digital TV receiver. The application works with and without...
Word embeddings is a well known set of techniques widely used in natural language processing (NLP), and word2vec is a computationally-efficient predictive model to learn such embeddings. This paper explores the use of word embeddings in a new scenario. We create a vector representation of Internet Domain Names (DNS) by taking the core ideas from NLP techniques and applying them to real anonymized...
DNSSEC Look-aside Validation (DLV) is examined, highlighting its lax specifications and privacy implications. By performing extensive experiments over datasets of domain names under comprehensive experimental settings, our findings firmly confirm the privacy leakages caused by DLV. We discover that a large number of domains that should not be sent to DLV servers are being leaked. We explore the root...
The number of Internet users in Indonesia in 2020 will increase up to 136.2 million users, while the Internet traffic will increase up to 2.1 Exabyte per month. However, 88% of internet traffic goes to international link and only 12% of traffic goes to domestic server. The problem is that the current capacity of Indonesian international links is only 20 Gbps, while the the required capacity is predicted...
This paper proposes a new Distributed Deny of Service attack in Named Data Networking, and analyzes the Interest Flooding Attack in the case of conspiracy between the consumer and the content provider. After collusion with the content provider server, the attacker sends an Interest Flooding Attack request that can be satisfied, and the content provider server delays a large enough time to return the...
DNS provides a global-scale distributed lookup service to retrieve data of all types for a given name, be it IP addresses, service records, or cryptographic keys. This service has proven essential in today's operational Internet. Our experience with the design and development of Named Data Networking (NDN) suggests the need for a similar always-on lookup service. To fulfill this need we have designed...
Domain Name System (DNS) is one of the most important services of the Internet since most communications normally begin with domain name resolutions provided by DNS. However, DNS has vulnerability against some kind of attacks such as DNS spoofing, DNS cache poisoning, and so on. DNSSEC is an security extension of DNS to provide secure name resolution services by using digital signature based on public...
Massively Multiplayer Online Games (MMOG), on which many users play simultaneously in a large scale virtual space on the Internet, have long been popular services. Most of MMOGs work based on Client / Server (C/S) model. Although C/S model is easy to manage games, it lacks scalability since the capacity of storages and the performance of servers that needs to be maintained by administrators increases...
Domain names and domain name system (DNS) have been used and abused for over 30 years since the 1980s. Although legitimate Internet users rely on domain names as their indispensable infrastructures for using the Internet, attackers use or abuse them as reliable, instantaneous, and distributed attack infrastructure. However, there is a lack of complete understanding of such domain name abuses and the...
Ongoing emphasis on the fourth industrial revolution requires further focus on the Internet of Things (IoT) as a means to integrate all relevant entities within a single technological system. In the integration process, a gateway to relay the raw data to an IoT endpoint is essential so that a joint interface among the heterogeneous domains can be provided. This work describes the development of a...
The electricity retail market nowadays still remains more or less enclosed. Massive family end-users could only purchase electricity from grid companies. The opportunities of being an electricity retailer are hardly available as they are tightly seized in grid companies hands. However, this rigid scheme is promising to be shifted with the deployment of household electricity storage devices, distributed...
In the view of converged fast-wired and fast-wireless networks (5G) with a transparent multi homed point of access to the Internet, new scenarios must be considered in the near future. In particular, this paper focuses on an Internet access leveraging simultaneously on different technologies such as ADSL, cable, WiFi, 3G/4G, satellite links, to offer a combined connectivity service. Some solutions...
Location-aware privacy protection is a key issue in mobile applications. And the issue is more concerned in Internet of Vehicles (IoV) because of the needs for more accurate location information. Conventional location hiding methods are not suitable to be used in IoV scenario, since they blur the location information fuzzily. In this paper, the dynamic pseudonym method is used to break the link between...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.