The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Educational Universities are gradually enhancing the traditional delivery mode towards blended learning, virtual classrooms and distance learning with the help of technology to reach the various demands of programs needed by people around the world. Learners are looking for specific programs of their interest, regardless of the location. Modern learning trends depend more on the technology and electronic...
Steganography is a method of hiding a secret message within an ordinary message, where as the goal of cryptography is to make data unreadable by an unauthorized persons. Video steganography is expansion of image steganography where video files can simply viewed in a sequence of images. There are many difference between video and image steganography. As the video content is very dynamic and have less...
Phylogeny model inference plays an important role in malware forensics. It aims at revealing the evolutionary relationship among malware instances. It is expected to be helpful for uncovering the trends of malware evolution and establishing a principled naming scheme. Although tree-based models are the mainstream direction, they are not suited to represent the reticulation events which are occasionally...
System-call analysis is recognized as one of the most promising approaches to malware detection due to its ability to facilitate detection of malware variants as well as zero-day malware. However, one of the key challenges of system-call based analysis - which prevents it from being used in real-time detection systems - is the excessive size/dimensionality of the system-call sequences that correspond...
A significant number of Moroccans use cybercafes on a regular basis for work and leisure. Unfortunately, if these cybercafe machines are infected with malware, such malware can steal users' passwords and other sensitive information. Assessing cybercafe security in Morocco can help assess the risk that users encounter when using cybercafes. However, to the best of our knowledge, there is no academic...
Dropbox, Google Drive, OneDrive, Box etc are popular File Storage providers for the Cloud. Recently reported vulnerability like Heartbleed for servers using OpenSSL has created panic among Cloud users. Hence, it is essential to encrypt the files by the users before uploading them to the cloud. Many File encrypting tools like Veracrypt, AxCrypt, Boxcrypt, are in place to encrypt files. But they have...
Typing CAPTCHA is usually troublesome and is unpleasant for the users. But the security of some of the websites depends on it and causes that human being is distinguished from robots facing with different websites. Filling CAPTCHA by humans can be used effectively like electronization of books and different texts. In this article it has been attempted to examine using image processing for converting...
Mission critical embedded systems should be capable of performing intended functions with resiliency against cyberattacks. The methodology of design-for-cybersecurity is now widely recognized, in which the effects of cybersecurity, or lack thereof, on system objectives must be determined. However, developers are often challenged by the difficulty of analyzing a system-under-design without complete...
Being DNS an essential service for Internet reliability, it is an attractive target for malicious users. The constantly increasing Internet traffic rate challenges DNS services and their attack detection methods to handle actual queries while being flooded by tens of millions of malicious requests per second. Moreover, state of the art on hostile actions evolve fast. DNS administrators continuously...
Information technology security is the collection of technologies, standards, policies and management practices that are applied to information to keep it secure. This paper gives an overview of information security management systems. By the end of this paper you should have developed an understanding of: some tactics used by hackers to hack into systems, computers, web servers, android phone, email,...
The access to information globally and by a significant percentage of the world population is an indispensable part of our daily routine. With this global network access comes the increased possibility of malicious attacks and unauthorized access to identity, information, and other resources. In order to curb the latest threats resulted from the internet revolution in the past few years many quick...
The term Next Generation Technology has been often used by IT enthusiasts. Many see next generation technologies as one of the solution vectors for the global challenges of the 21st century. However, a small research has shed light on this term and specified its characteristics and meaning of it. Next generation technologies are critical to solve large problems faced by this world. Therefore, this...
Today Peer-To-Peer (P2P) networks are becoming more important from high scalability and low cost point of view, and these networks are popular platform for video streaming. With burgeoning of P2P networks, one of the interesting areas of research is confronting to various attacks and threats against these networks. Since, video streaming is a popular application of P2P networks, some attacks like...
Internet technology today is not free from many problems or security holes. This security holes could be exploited by an unauthorized person to steal important data. The case of the attacks occurred because the party that was attacked also did not realize the importance of network security to be applied to the system. Honeypot is a system that is designed to resemble the original production system...
Smartphone usage nowadays can't be separated from our daily lives. Almost every daily activity can be supported by smartphone. Aside from its general uses like communication purpose, smartphone also used to store private data. Technological advance also change the way people do their activities, one of them is financial activities. Daily activity be easier with the technology of the internet. Along...
Cyberization, as a new big trend following computerization and informatization, is the process of forming a new cyberworld and transforming our current physical, social and mental worlds into novel cyber-combined worlds. Cyber science, responding to the cyberization trend, aims to create a new collection of knowledge about these cyber-enabled worlds, and provide a way of discovering what is in the...
Interconnected computer systems and services using networks have improved the dependence on the stored accumulated data. Interconnected systems via network, in turn, could expedite security attacks. Recently, network security and cryptography techniques have evolved, leading to the advancement of biometric-based smart cards technique to implement the security of networks. In this paper, we demonstrated...
Android has dominated the market of mobile devices. Meanwhile, it has become the main target for attackers. How to detect and analyze Android malicious applications (malapps) is an ongoing challenge. Current malapps have become increasingly sophisticated. In particular, zero-day (unknown) malapps appear very frequently and can evade most detection systems that are based on the signatures or patterns...
In today's world of fast communication, to insure, the security and integrity of information is a big challenge. Data hiding also known as Steganography is one of the fields that deal in methods related information security and hide secret information and message other information. This paper elucidates the effect of data hiding in different number of least significant bits in the primary colors of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.