The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Call detail records (CDRs) collected at telecommunication networks have been well studied to reveal human behaviors such as voice service usage, contact regularities and mobility patterns. With the advances in big data technology, carriers can now collect, store and analyze more data, such as records of user mobile web activities, at scales much larger than CDRs. In this paper, we study 14 features...
One of the most effective Cyber-attacks against legitimate targets is Denial of Service (Dos). Despite the fact that security improvements in IPv6 are notable, meanwhile “black hat” experts launch their continuous threats against business network and banking systems to damage the network service development. In order to mitigate such security threat, we need to understand the infrastructure and the...
As an increasing number of patients seek medical information online, it is crucial to bring expert-vetted information to patients. Multiple expert-vetted online resources exist for their accuracy and authority of medical knowledge. However, it is not clear which resource is better in meeting the information needs of the patients. Utilizing a collection of questions raised by patients with diabetes...
Semantic analysis is an important component of recommendation systems and information retrieval in computer aided detection. Previous researches have made certain breakthroughs in disease diagnosis and drugs recommended by semantic analysis. We propose a bilateral shortest paths method for computing semantic relatedness based on the human thought patterns for making sufficient use of the hyperlink...
Aim of this research to analysing the level of the information security awareness of the undergraduate economic information technology students after the information security course. The young generation use smartphones, tablets to keep in contact with friends at home, on public transport, in the school etc. They use different communication forms on the internet like social networks, chat rooms and...
The centralized zone data service (CZDS) was introduced by the Internet Corporation for Assigned Names and Numbers (ICANN) to facilitate sharing and access to zone data of the new generic Top-Level Domains (gTLDs). CZDS aims to improve the security and transparency of the naming system. In this paper, we investigate CZDS's transparency by measurement. By requesting access to zone data of all gTLDs...
Internet traffic identification is an essential preliminary step for stable service provision and efficient network management. The payload signature-based-classification is considered as a reliable method for Internet traffic identification. But its performance is highly dependent on the number and the structure of signatures. If the numbers and structural complexity of signatures are not proper,...
As the rapid progress of internet and the widespread of Network media, barrage videos are widely favored by the audiences, because of their unique way of interactive and emotional experience. However, porny, brutal and rude words occasionally happen in the barrages. Thus information security in barrage videos has become a serious problem and requires further study. In this paper, the harmful information...
Early detection of depression is important to improve human well-being. This paper proposes a new method to detect depression through time-frequency analysis of Internet behaviors. We recruited 728 postgraduate students and obtained their scores on a depression questionnaire (Zung Self-rating Depression Scale, SDS) and digital records of Internet behaviors. By time-frequency analysis, we built classification...
Cyber-attacks appear to have grown in the past few years. Many policy changes have been made to control them, however, a clear path to a safe and secure cyber world is not visible. A mere technical view to confront the cyber-attacks could be futile if motivations behind attacks are not understood. To understand the motives behind cyber-attacks, we look at cyber-attacks as societal events associated...
An Application-Programming Interface or API provides a set of program functions that can be used to build new applications. In this paper, we study how to use the expectation-confirmation theory (ECT) to identify API usability problems, and what obstacles a novice developer faces when learning a new API and its accompanying development tools. We conduct a study over the impact of using a visual editor...
A personal or enterprise collection of a large set of face images may contain many types of tags used for querying the collection. Often the tags have many irrelevant content that may not reflect the image content in terms of the facial characteristics. In this paper, we propose a data curation method to filter out the irrelevant face images using a face recognition based subgraph identification....
Researches on human thinking styles have received wide attention, especially in online education; an aspect of human computer interaction. However, the deciphering of specific thinking styles of an online user has suffered setbacks due to the limited exposition on the probability of online thinking style signature of users. This study explored this limitation with the assumption that human daily behavioral...
In this paper, a thinking and research method of inflation expectations measurements based on web search data is proposed. First, a conceptual framework between search data and inflation expectations is built in order to clarify their mechanism of association. Then, a index of web inflation expectations is built by using principal component analysis and its effectiveness is verified. The results show...
The B to C E-commerce Enterprise (B2CEE) has produced extensive and profound influence on the economic structure. To study the structural factors of stock price of B2CEE which will influence the market pricing of them, we have introduced fractal method and made an empirical analysis on the typical case of listed B2CEE. Furthermore, to reveal the true value of B2CEE, it must separate the trend factor...
This paper tries to do the research of analyzing the relation of the customer trust, the customer satisfaction and purchase intention under the electronic commerce shopping environment. Drawing on the theory of customer trust, customer satisfaction and purchase intention, based on a survey of 102 respondents from the University in China, the United Kingdom, and the United States, the results showed...
The Internet is simply a series of worldwide computer networks linked together, communicating almost instantly by using various access technologies. It is playing a major role in many areas of our lives, such as communication, entertainment and information which is supported by newer innovations and technology evolvement. While the broadband Internet penetration rate is encouraging in many countries,...
In content-centric networking, the schemes of innetwork caching can affect the performance of the whole network. Existing schemes lack of the global view, which results in inefficient caches. In this paper, we aim to analyze the real-time distribution of contents among caches from multiple perspectives. This paper proposes TCBRP, a scheme that analyzes caching tendency of various contents in reverse...
Honeypots and honeynets are unconventional security tools for the purpose of studying techniques, methods, tools, and goals of attackers. Analysis of data collected by these security tools is important for network security. In this paper, we focus on information about the locations, shapes of geographic features and the relationships between them, usually stored as coordinates and topology (spatial...
As web attackers hide themselves by using multi-step springboard (e.g., VPN, encrypted proxy) or anonymous network (i.e. Tor network), it raises a big obstacle for traceability and forensics. Furthermore, traditional forensics methods based on traffic and log analysis are just useful for analyzing attack events but useless for fingerprinting an attacker. Because of this, the browser fingerprinting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.