The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the explosive growth of users in mobile carrier, telecommunication fraud causes a serious loss to both of the users and carriers. The academia has an increasing interest in the issue of detecting and recognizing fraudster, and varies strategies have been proposed to prevent the attack and fraudulent activity. However, fraudsters are always inclined to hide their identity and perform the fraudulent...
We propose a novel IoT directory service for storing, updating, and providing records of mobile IoT devices or objects. The IoT directory service is designed to manage a massive number of records (about one billion) and support fast lookup (latency of less than 10ms). It performs proactive caching of the records in various replicas (following the movement of mobile IoT devices or application clients)...
Nowadays, the attacks on the Internet are becoming more complex, advanced and concealed. A large number of security threats arise. The signature-based detection technology is efficient and simple which is widely used for malicious codes detection system. In this paper, we firstly focus on the principle of the method, and summarize the specific steps to implement it, especially feature extraction,...
The replication and dissemination of multimedia data become increasingly convenient and efficient, so a lot of redundant multimedia data, especially image files, have been generated and stored on the Internet. Therefore, it is necessary to perform deduplication of images. However, the existing deduplication methods of regular files are hash-based, which cannot be applied to the deduplication of images...
In order to remember easily, human beings may use personal information as part of their passwords. In recent years, incidents of Internet information leakage emerge incessantly, which provides more materials for password guessing, such as password database and personal information database. If we have known part of the users' personal information, how to use these data to guess passwords, the research...
A significant milestone is reached when the field of software vulnerability research matures to a point warranting related security patterns represented by intelligent data. A substantial research material of empirical findings, distinctive taxonomy, theoretical models, and a set of novel or adapted detection methods justify a unifying research map. The growth interest in software vulnerability is...
Hidden behind domain names, there are lucrative (and ingenious) business models that misuse/abuse the DNS namespace and employ a diversified form of monetization. To curb some of those abuses, many research works have been proposed. However, while having a clear contribution and advancing the state-of-the-art, these works are constrained by their limited datasets and none of them present a survey...
The Internet of Things (IoT) involves the increasing prevalence of objects and entities with the ability to transfer data over the network automatically. The main problem of IoT software system is that the security has not always been considered. This study applies five security design patterns for the development of an IoT software system. The security issue of unsecure application data is addressed...
Troubleshooting in an infrastructure-as-a-Service (IaaS) cloud platform is an inherently difficult task because it is a multi-player as well as multi-layer environment where tenant and provider effectively share administrative duties. To address these concerns, we present our work on CloudSight in which cloud providers allow tenants greater system-wide visibility through a transparency-as-a-service...
Web data acquisition is the foundation of Web data mining. Web crawler is an important tool for Web data acquisition, but the frequent updates of Web data structures, data sources and distribution channels, resulted in high costs of crawler program development and maintenance. In order to solve this problem, this paper designed and implemented an intelligent dynamic crawler, which stored the data...
The number of devices that are being connected by the Internet is growing rapidly and hence, safeguarding private information by incorporating hardware and software security measures has become crucial. Physically unclonable functions (PUFs) have been proposed to enable lightweight hardware security which uses the inherent manufacturing variations as a way to generate unique signatures. However, given...
Kings Eye is a platform independent situational awareness prototype for smart devices. Platform independence is important as there are more and more soldiers bringing their own devices, with different operating systems, into the field. The concept of Bring Your Own Device (BYOD) is a low-cost approach to equipping soldiers with situational awareness tools and by this it is important to facilitate...
Rising technologies as wireless technologies, Sensing technologies and Communication technologies transformed the Internet into an integrated network of things termed as Internet-of-Things (IoT). IoT is a network of things connected over by Internet, all the pros and cons of internet are also inherited to IoT applications. Hence, security and privacy of user data is a serious issue in IoT. In this...
Cloud Security is a major concern for storing and protecting of data, applications and services, accessed as per the user requirements [3]. There is a need to provide guaranteed access control mechanism, so that only approved and permitted users will be able to use the data as on demand basis in the cloud [1]. Provenance is a major entity in cloud security. It includes information that is used to...
Biometrics based authentication systems face the major challenge in securing the template. Although multi-modal biometric techniques and cryptographic techniques offer security but they can be easily compromised. This paper explores the possibility of combining features from the same biometric trait (fingerprints) i.e. keeping it unimodal but still offering the same security as that of the combined...
Digital electronic type of physical unclonable functions (PUFs) are vulnerable to modeling attacks. They also suffer from errors due to temporary environmental variations, such as the variation of the ambient temperature. Motivated by that, we designed a new mixed-signal PUF using 45nm MOSFET technology. The design presents an expanding approach for the number of processed bits. The design generates...
Vulnerabilities in web applications are due to various factors. Failure to properly validated user input is one of the factors that led to run unauthorized code in these programs. Sqli and Xss are two common vulnerabilities in web applications, That is due to lack of proper input validation. Therefore, in this paper we study how to protect organizational websites of north khorasan in iran against...
The wide deployment of biometric recognition systems has raised several concerns regarding their security. Among other threats, morphing attacks consist of the infiltration of artificial images created using biometric information of two or more subjects. These morphed images are hence positively matched to several subjects. Recent studies have shown that such images pose a concrete threat to civil...
To satisfy security requirements, software architects often adopt security tactics. These architectural tactics provide mechanisms for resisting, detecting, reacting to and recovering from attacks. Consequently, flaws in the implementation of security tactics or their deterioration during software evolution and maintenance can introduce severe vulnerabilities that could be exploited by attackers....
The Web today is a growing universe of pages and applications teeming with interactive content. The security of such applications is of the utmost importance, as exploits can have a devastating impact on personal and economic levels. The number one programming language in Web applications is PHP, powering more than 80% of the top ten million websites. Yet it was not designed with security in mind...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.