The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The significance of cyber security resilience beyond organizational borders is increasingly recognized with regard to maintaining individual cybersecurity manageability. The limitations and complexity of each cyber security technology combined with the growth and distribution of cyber attacks impact the efficiency of cyber security management and increase the activities to be performed by computer...
Intrusion detection is the identification of unauthorized use, misuse, and abuse of computer system infrastructures by both system insiders and external intruders. Detecting intrusion in distributed network from outside network segment as well as from inside is a difficult problem. Network based Intrusion Detection System (NIDS) must analyze a large volume of data while not placing a significant added...
This work presents an experience developed with first year students of Grade on Computers and Grade on Telecommunications at Universitat Politècnica de València. The academic programme of both grades includes an introductory course to computers, called Computer Fundamentals. The course is different for each grade, but they share some topics. One of these common topics is data representation in computers,...
Currently informatics resources are facing major security challenges carried out by hackers or computer criminals, which are increasing in number and improving their methods of attacking computer systems. For this reason, Equipment Computer Incident Response Teams (CSIRT) has been created to respond to several attacks in accidents or security breaches in the information resources of organizations...
The management model for the process of IT-services guaranteed level assurance is considered. Quality level of service is controlled by applying the alternative technologies for information flows processing and IT-services structural reconfiguration in the Enterprise Resource Planning system (ERP-system). The example, that illustrates the decision-making process with the use of game-theoretic approach,...
Sensus Ekonomi 2016 (SE2016-Economy Census 2016) which will be held in 2016 is an important and massive activity. Badan Pusat Statistik (BPS-Statistics Indonesia) taking main responsibility needs to arrange strategic and appropriate actions for the success of the event. One of the actions that can be used to support SE2016 implementation is by providing information about progress of SE2016. Therefore...
Large-scale multi-agent systems (LSMAS) development methods are becoming a necessity in a world of ever growing numbers of computer agents incorporated in various devices and services used by people in all areas of life. Organization in such large-scale systems, becomes therefore a very relevant concept in research on LSMAS, as the mentioned agents are expected to cooperate, compete, and share information,...
Named entity recognition is one of the important topics in the research area of natural language processing. Named entity recognition studies conducted on Turkish texts are quite limited, compared to the studies on other languages. Besides, the lack of common data sets makes the comparison of different approaches harder. In this study, a dataset comprising news articles in Turkish annotated with named...
Deepens the theoretical issues related to the Information and Knowledge Engineering with emphasis on reflection about its importance in the field of scientific research and social contribution to the development of the country. The paper presents these theoretical concepts: Information Engineering as the creation process and systematization of a volume of value-added data to a particular business...
Ports can be considered as a mixed network composed of different stakeholders such as private service provider companies, public organizations, professional and social associations. Each of them has its own aims and the port community exercises the role of coordinator, taking on responsibility for governance. In general, the interaction among the different actors generates strategic synergy, contributing...
Opinion dynamics is a collective decision making and focuses on the study of evolution and formation of opinions in a social group. Bounded confidence rule is one of intrinsical interaction principles in the human behavior dynamics. When there is no opinion leader in a social group, for a bounded confidence based opinion dynamics, the evolution of the collective opinion of the group generally depends...
The models for logical controlling of global computational processes in computer networks with agent-oriented cloud metacomputing services based on collective data transferring were proposed in this article. This allows simplifying of the implementation of massive parallelism in large-scale applied distributed systems. Using of the formalism of asynchronous predicate networks was proposed to control...
Aim of this research was to examine familiarity of students in Croatia with threats in form of social engineering and phishing attacks. To obtain our research data, a practical assessment of student's capabilities to identify phishing attacks against them was conducted with the help of a graphical questionnaire that presented real phishing messages that tried to identify what kind of scams or attacks...
Efficient incident response operations require information sharing among parties to allow appropriate actions to be considered and executed. This sharing needs to be realized even beyond an organization's borders since many security incidents involve multiple organizations, but it is currently performed manually and thus is inefficient. In this paper, a scheme that facilitates the exchanges of enriched...
This paper presents the methodology and its correspondent software conceived by Daimon Engineering to propose the medium voltage distribution system work plan of CELESC. To accomplish this job, a specially designed computer program has been created to take into account several technical variables, according to the type of problem (overcapacity of conductors and voltage drops). As a result of this...
Computer science students use data array processing in many courses. To exploit the full power of caches and obtain higher performance, they mostly use the textbook example of sequential access of data arrays. However, a lot of discrepancies occur and the expected performance is not obtained in real life program executions, mostly due to the existence of several cache levels, with various architectures...
Teaching a hardware-based course for computer science students is a very challenging task. Students need to do a lot of practical work in the laboratory, usually do some practical project, learn theory and finally take the exam. This is a very hard task for the first hardware-based course — Computer architecture and organization (CAO), especially if it is offered in the first year of studies. Many...
Project Management (PM) tools are necessary to manage contemporary software projects. Computer professionals need to know how to use these tools, and higher-education computer courses teach their usage. Therefore, educators often adopt general usage tools, such as MS Project. However, as such tools lack didactic features, educational PM tools have been developed. Yet, previous studies have shown that...
Time based Self-destructing email mainly aims at protecting data privacy. In this paper we discussed the spear phishing process as a part of advanced persistent threat attack which gathers information and targets an individual or organization. It implements of social engineering techniques to gather data regarding recipient. Malicious emails are sent by combining the psychological and technical tricks,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.