The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article is devoted to methods of improving the efficiency of security systems using Honeypot technology. There are observed basic principles of creating the protection system using this technology. There are suggested methods of web services organization which use affected software to efficiently detect intrusions. There are also given options of collecting statistical information about attacker's...
On the basis of the evaluation of local properties of the data many nonlinear techniques have been suggested the field of computer vision. The application of the dimensionality reduction covers many fields like medical, geographical, simulation and many more. I have studied MDS, LLE and LTSA. Overall, the users are allowed to access the search-tools in linear system. A review and systematic comparison...
This paper presents voltage security assessment with application of Phasor measurement unit (PMU) using Decision Tree (DT). An algorithm is developed by CART to identify the most sensitive buses which are most viable and hampered the security of power system. Such buses are ranked in terms of their index called joint bus ranking. PMUs are costly devices and should be placed only on such buses which...
Day to day life is more unsecure as per the hacking is concerned. Our data is not secure because it can be stolen, hacked, destroy, manipulate, password may forget, guess, Card, token, etc. To overcome this problem biometrics is used as a strong authentication system. The person should be present at the time of the instance. Biometric security is challenging task in day to day life because it is difficult...
Encryption of sensitive data is commonly used to preserve confidentiality and integrity. The problem with encrypting data is we have to decrypt it for applying operations on files such as altering a word document or querying a statistical database containing financial data. Decrypting the data will leave it vulnerable. If we want to perform conditional based search queries in an encrypted data entire...
In this paper a novel technique of fragment visible mosaic image is proposed. It is a unique and novel kind of computer art called Mosaic tile image steganography technique, which transforms a color secret image into a so called secret fragment visible mosaic image of the same size. Initially choose randomly any color cover image from the existing database, which looks similar to secret color image...
Brain is a vital part of our body, without brain can't perform any task. Human beings are termed as an intelligence because of the unique properties of the human brain. When we want to do any activity, it generates the signals. On the basis of brain signal our body act accordingly. The signal pattern of brain to give the instruction to the organs is varies person to person. Therefore, by using single...
Today, several institutions of higher learning are using access cards as access control measure to gain access to their institutions and facilities. Though, these cards are simple and convenient in terms of usage, they offer the lowest security strength as they are often prone to lost, theft, forget and clone. If compromised, valuable information and asset can be stolen or destroyed. However, every...
Fingerprint Match-on-Card (MoC) offers the highest degree of privacy and security to cardholders as the fingerprint never leaves the secure environment of a smart card. The level of security of a biometric system is evaluated by the location where the biometric matching takes place. However, it is challenging to implement an accurate fingerprint MoC algorithm, which can execute in a short period of...
In this paper, we introduce a Webpage security tool called EasyIPBlocker that could be used to block away the malicious internet users from accessing systems, several of the main modules being described in details.
Android enabled mobiles/devices are high in use by huge number of users for various purposes. Other than for just calling, most of the users are using these devices for storing and maintaining important data such as personal information, calendar schedules, photos, videos, office documents and much more. These devices are also used for chatting through various instant chat messaging and social networking...
Web applications hosted on the Internet are naturally exposed to a variety of attacks and constantly probed by hackers for vulnerabilities. SQL Injection Attack (SQLIA) has been a major security threat on web applications since over 15 years. Detecting SQLIA at runtime is a challenging problem because of extreme heterogeneity of the attack vectors. This paper explores application of node centrality...
In this paper we are showing a financially savvy and effortlessly implementable i-voting (web voting) framework particularly for India in view of adhoc network. The essentials of cognitive radio innovation and Adhoc organize in view of cognitive radio technology are initially presented. The idea of smart i-voting framework is then proposed and how it can be executed in suburban region where web services...
Today's modern information era society imposes great necessity of various software applications which now have an increasingly important impact on human life. The need for software applications and developers is rapidly increasing. To make up that demands enterprises have to make more applications in shorter time frames. Workload of software companies is constantly increasing, as they not only have...
Data is the most valuable thing today from an individual to an organization because of it large size and useful information. But it is vulnerable and is more prone to attacks. Steganography hides selected files securely in a file system in such a way that without the corresponding access keys, an attacker would not be able to find their existence. Many steganography systems assure reliable data security...
To maintain acceptable levels of security, organizations must manage their IT assets and related vulnerabilities. However, this can be a considerable burden because their resources are often limited. We have been working on a technique and system architecture that monitor the vulnerability of the IT assets on an organization's administrative networks. It uses identifiers of IT assets to locate vulnerability...
The system proposed is a door unlocking system containing multiple doors any of which can be used to access a certain zone e.g. a laboratory or library. The system is implemented using a central server which contains a central database gathering all the information about the authorized personnel. The hardware components required are RFID reader, passive RFID tags, wireless transmitter & receiver...
This paper discusses user behaviour and interactions for multimodal authentication system. Multimodal means, multiple authentication methods are provided for user to access a web application. The supported methods are password, digital certificate, and one-time password (OTP). Users are able to select any methods based on user's preference; personalizing authentication. Nevertheless, the availability...
Today, web browsers are used to access and modify sensitive data and systems including intranets and critical control systems. Due to their computational capabilities and network connectivity, browsers are vulnerable to several types of attacks, even when fully patched. Browsers are also the main target of phishing attacks. Many browser attacks, including phishing, could be prevented or mitigated...
Although using geolocation databases for spectrum sharing has many pragmatic advantages, it also raises potentially serious operational security (OPSEC) issues. OPSEC is especially a paramount consideration in the light of recent calls in the U.S. for spectrum sharing between federal government (including military) systems and non- government systems (e.g., cellular service providers). In this paper,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.