Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Security is a prime concern in today's era of technology when dealing with digital data. All the information is managed by the file system which is the core layer of security in an Operating System. Due to lack of security at this layer, private information can be accessed by an intruder or in case of theft data can be read via mounting it on to a mount point and accessing the information. Other layer...
Assurance (Security and Safety) Case is a proven-in-use methodology to demonstrate a system compliance with security and safety critical requirements. An advance approach to improve Assurance Case is proposed in a view of Assurance Case Driven Design (AC DD). A practical using of AC DD lays in cost-effectiveness improvement of certification and licensing processes Assurance Case is based on graphical...
Phishing is a considerable problem differs from the other security threats such as intrusions and Malware which are based on the technical security holes of the network systems. The weakness point of any network system is its Users. Phishing attacks are targeting these users depending on the trikes of social engineering. Despite there are several ways to carry out these attacks, unfortunately the...
Certification has been proved as an essential mechanism for achieving different security properties in new systems. However, it has important advantages; among which we highlighted the increasing in users trust by means of attesting security properties, but it is important to consider that in most of cases the system that is subject of certification is considered to be monolithic, and this feature...
Clocks have a small in-built error. As the error is unique, each clock can be identified. This paper explores remote computer identification based on the estimation of clock skew computed from network packets. The previous knowledge of the method is expanded in various ways: (1) we argue about the amount of data that is necessary to get accurate clock skew estimation, (2) the study of different time...
By analyzing the binary executable files comparing technique, this paper presents a method to detect vulnerabilities in Windows system based on security patch comparison. The technology is mostly used for detecting vulnerabilities which are patched by Microsoft but there is no clear location and detailed information of the vulnerabilities. Finally, the result of detecting MS15-034 vulnerability experiment...
MOOC environments seem to offer massive potential for social learning. However, MOOC environments have unique challenges for pedagogy which are not present in other socio-constructivist learning environments: the scale and diversity of participation. Many points of view are accessible, but few means of filtering. This paper examines interaction data from several MOOCs. Interaction data is an indicator...
Stray voltages have always been a concern to utility companies and customers. But methods to troubleshoot and monitor nonroutine stray voltage problems are very limited. This paper presents a passive, measurement-based method to identify the contributors to the common cause of stray voltages, the neutral-to-earth voltage (NEV) rise at the service entrance point. The paper shows that the NEV can be...
Trusted input techniques can profoundly enhance a variety of scenarios like online banking, electronic voting, Virtual Private Networks,, even commands to a server or Industrial Control System. To protect the system from malware of the sender's computer, input needs to be reliably authenticated. Previous research in this field is based on fixed assumptions about trustworthy components, is, thus, too...
Botnets are one of the major threats to network security. A botnet can launch attacks by stealing information, phishing sites, sending spam mail and setting up distributed denial of service (DDoS). Some botnets called Domain Generation Algorithm (DGA) Botnets apply a domain generation algorithm to avoid being detected by the traditional blacklist detection scheme. Using a domain generation algorithm,...
Operating system is essential to operate computers. Normally, computers come with preloaded operating systems. However, often the preloaded operating systems are not able to fulfill all requirements of users. The users sometimes need to change the operating system based on their needs. Although some comparative studies and tools are available on operating systems, there is still a lack of tools that...
Social networking sites have billions of users who communicate and share their personal information every day. Social engineering is considered one of the biggest threats to information security nowadays. Social engineering is an attacker technique to manipulate and deceive users in order to access or gain privileged information. Such attacks are continuously developed to deceive a high number of...
Honeypots and honeynets are unconventional security tools for the purpose of studying techniques, methods, tools, and goals of attackers. Analysis of data collected by these security tools is important for network security. In this paper, we focus on information about the locations, shapes of geographic features and the relationships between them, usually stored as coordinates and topology (spatial...
In this paper, we conducted a review of techniques and methods used for collaborative data management for business purposes on the WEB. The aim was to propose a document flow optimization and to offer an information technology support for all departments of an organization. In a business organization or a firm, professionals involved in solving specific tasks either use the same data (common information)...
Mobile devices are becoming a more popular tool to use in day to day life; this means that they can accumulate a sizeable amount of information, which can be used as evidence if the device is involved in a crime. Steganography is one way to conceal data, as it obscures the data as well as concealing that there is hidden content. This paper will investigate different steganography techniques, steganography...
Inter-App Communication (IAC) plays an important role in Android platform to share data and services among applications. However, the existence of IAC capability leaks could lead to the unauthorized privileged operations. In this paper, we first investigate the usage of IAC in Android applications to show the prevalence of IAC in the Android development model. To mitigate the threat caused by IAC...
Software Defined Networking (SDN) is the new promise towards an easily configured and centrally controlled network. Based on this centralized control, SDN technology has proved its positive impact in the world of network communications from different aspects. Consistency in SDN, as in any rule-based network, is an essential feature that every communication system should possess. In this paper, we...
Android applications (apps) generate a consistent amount of data traffic. A noticeable share of this generated data traffic is used to convey third party advertisement, or to collect information about the user and its phone, generally with the target of profiling users. Such a traffic is not needed to the correct app execution and can be considered unwanted overhead. In this paper we propose Data-Sluice,...
Personal health record (PHR) is considered a crucial part in improving patient outcomes. However the adoption rate by the general public in the US still remains low. To find out the barriers in adopting PHR, we have surveyed articles related to personal health record system (PHRS) from 2008 to 2016 and categorized them into 6 different categories such as motivation, barriers, ownerships, interoperability,...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.