Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Cross site scripting (XSS) is a kind of common attack nowadays. The attack patterns with the new technical like HTML5 that makes detection task getting harder and harder. In this paper, we focus on the browser detection mechanism integrated with HTML5 and CORS properties to detect XSS attacks with the rule based filter by using browser extensions. Further, we also present a model of composition pattern...
We collected 79,012 articles from 1916–2016 related to big data to determine which topics were being studied and how much of the literature was focused on privacy or security-related keywords. The analysis demonstrated that the big data paradigm commenced in late 2011 and the research production exponentially rose starting in 2012, which approximated a Weibull distribution that captured 82% of the...
Security is a worldwide issue. Individuals need their information and frameworks secure from malevolent dangers and assaults. A framework must be secured inside and out from illegal penetration. Security quality affirmation checks if the application is defenseless against assaults, in the event that anybody can hack the framework or login to the application with no approval. It is a procedure to discover...
Biometric systems may be used to create a remote access model on devices, ensure personal data protection, personalize and facilitate the access security. Biometric systems are generally used to increase the security level in addition to the previous authentication methods and they seen as a good solution. Biometry occupies an important place between the areas of daily life of the machine learning...
In recent years, many financial sectors are evolving with huge numbers of web applications, which plays a crucial role in organizations to make important decisions. Considering this, the data has to be secured in order to prevent it from any attacks which lead to a huge loss. One of the topmost attacks in the database is SQL injection attack, is injecting some malicious query into the database causing...
In this paper, we present a real-time face recognition system for home security service robot which can be applied to recognize the person's face in front and give a warning when the identity of the person is a stranger. Considering the complexity of the actual situation, there might be some errors causing by the following factors like the angle, the size, the environment and the illumination of the...
The healthcare system consists of large volumes of data which are usually generated from diverse sources such as physicians' case notes, hospital admission notes, discharge summaries, pharmacies, insurance companies, medical imaging, laboratories, sensor based devices, genomics, social media as well as articles in medical journals. Healthcare data are however very complex and difficult to manage....
Mobile technology is changing the data collection and analytics in traditional healthcare practice. The distributed and real time nature of the operation brings security challenges in the gathering, processing, and analysis of personal biometrics data gathered by various wearable health monitoring devices. We present a security framework which identifies the anomalies not only based on the range of...
Cloud computing relies on virtualization technologies to provide computer resource elasticity and scalability. Despite its benefits, virtualization technologies come with serious concerns in terms of security. Although existing work focuses on specific vulnerabilities and attack models related to virtualization, a systematic analysis of known vulnerabilities for different virtualization models, including...
Cloud Computing is the key technology of today's cyber world which provides online provisioning of resources on demand and pay per use basis. Malware attacks such as virus, worm and rootkits etc. are some threats to virtual machines (VMs) in cloud environment. In this paper, we present a system call analysis approach to detect malware attacks which maliciously affect the legitimate programs running...
Critical infrastructure, which used in energy, industry, and financial area, is one of essential components for modern society. Thus, critical infrastructures and its availability must be kept secure. Inspecting cyber threat is needed to prevent cyber-attack on critical infrastructure. By using OSINT (Open Source INTelligence) process, it is possible to gather meaningful intelligence related to security...
In recent years, because of the interconnection of large grids and the accession of HVDC, real-time analysis approach is needed for transient voltage security (TVS) analysis. Traditional simulation analysis is time-consuming and the transient energy function approach is difficult to analyze large scale power systems. In this paper, an approach for real-time TVS analysis is proposed based on off-line...
In the cloud computing environment, one of the most important module is the Scheduler. As the most popular open-source cloud platform, OpenStack provides us with a massive amount of scheduling strategies. But there is no one considering of the hierarchies of the VMs and hosts. We will guarantee the security of VM through these hierarchies. Although OpenStack is abundant in scheduling strategies, none...
This paper introduces a new trust management system (TMS) for the cloud computing domain. The wide majority of these systems do not fulfill the requirements of today's cloud environments which are characterized by heterogeneity in providers, capabilities and users. As such, they are limited to few aspects of trust. In fact, they are bound to a single function or a direct interaction with the cloud...
This article presents a data audit system, which confirms that proper use of data is performed on the iKaaS platform (intelligent Knowledge as a Service) platform. The proposed data audit system can alleviate ambiguous anxiety of data owner about unauthorized use by providing measures to understand that illegal use of data cannot occur. This achievement is expected to support the construction of the...
This exploratory empirical paper investigates annual time delays between vulnerability disclosure notifications and acknowledgments by means of network analysis. These delays are approached through a potential clustering effect of vulnerabilities across software vendors. The analysis is based on a projection from bipartite vendor-vulnerability structures to one-mode vendor-vendor networks, while the...
Cloud computing together with emerging technologies has made dramatic and descriptive changes to the traditional datacenters by enabling cost savings and introducing modern resource optimization technics to move non-critical business functions into pay-as-you-go services. Multi-tenancy is one of the top ranked technology which fuels cloud computing. Multi-tenancy is a technology which allows multiple...
SQL (structure query language) injection is one of threat to the application connected to the database. By implementing SQL injection attacker can gain full access to the application or database so that it can remove even significant data irresponsibly. Applications that do not validate the user's input appropriately make them vulnerable against SQL injection. Various methods have been developed to...
Service Oriented architecture is a trending standard for the development of software based on services. Generally a self-standing function is considered as a service. The Service interoperability is a serious issue between different organizational databases due to numerous heterogeneities among different services. In the Existing system, the Department of Civil Supplies and Consumer Affairs does not...
As a member of the European Union, Hungary face different challenges, of which the most important are the transformation of the healthcare system, the Social Security and pension system and the system of taxation. These economic and social challenges require long-term governmental strategies, which should be modelled, tested, verified in some way. It is for this challenge that we find an efficient...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.