Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Traffic monitoring and analysis has become necessary to understand the nature of information flowing within an organization. This is particularly important due to the recent trend of increase in the percentage of anomalous traffic in the overall organizational traffic composition. In this work, we attempt to determine the typical characteristics seen in various organizational network traffic. We use...
Although people think that their identity is not revealed on the internet, the confidentiality and protection of personal information on unreliable networks such as the internet is an important question. In this study, a sample application on network packet tracing and analysis of network cameras with Wireshark program is realized to show how partial access to personal information and location information...
With the increased use of ICT in different areas of contemporary life, the widespread access to the Internet, and the use of social media, individuals and organisations face constant threats and challenges resulting from the bad consequences of cybercrimes. Research shows that the incidence of cybercrime is increasing. In response to these threats and challenges, government and law enforcement agencies...
Due to the opportunities provided by the Internet, people are taking advantage of e-learning courses and enormous research efforts have been dedicated to the development of e-learning systems. So far, many e-learning systems are proposed and used practically. However, in these systems the e-learning completion rate is low. One of the reasons is the low study desire and motivation. In this work, we...
Globally the internet is been accessed by enormous people within their restricted domains. When the client and server exchange messages among each other, there is an activity that can be observed in log files. Log files give a detailed description of the activities that occur in a network that shows the IP address, login and logout durations, the user's behavior etc. There are several types of attacks...
The Internet is one of the most rapidly developing technologies. New protocols for the Internet are always developing. This article focuses on the way to simplify development process of new protocols and modeling of network devices. In this paper there is presented general solution architecture and main functional blocks are described. The main objective of this work was to create a general-purpose...
This research is an in-depth study which explores the ICT usage among the students and the challenges they come across. The aim of this research was to determine the extent of ICT usage among students; and to study the problems and challenges they have to address in utilizing this facility. Four questions were used to enable this research. The researcher formulated a questionnaire to gather data from...
Internet addiction also called as "internet dependency" is a disorder related to excessive or poorly controlled preoccupations regarding computer use and internet access. Although the advantages of internet are undeniable, however, from the pathological perspective its excessive usage is creating disturbances not only in family and relationships but also in health, academics and memory recall...
In everyday circumstances, we always search for the best method to find results that we may see as accurate or efficient. However, the question is how do we trust the information? Do we easily use the result without first identifying the trustworthiness? In this paper, we will discuss the issue of trustworthiness especially the information sharing based on user experience. We identify new alternative...
Online reviews are becoming one of the vital components of e-commerce in recent years as so many people consider having different opinions prior to buying online products or apprehending any online service. Nowadays, in the era of web 2.0, it is completely understandable that people rely on online reviews more than ever while taking a decision. However, guaranteeing the authenticity of these sensitive...
Color characteristics of computer monitors and similar display devices can significantly alter the way an image is perceived by the human eye. Modern cameras and software applications are able to create vibrant scenes and retain their original colorfulness through an embedded ICC[1] profile. Gamut differences between input and output mediums require color management techniques in order to preserve...
Malware is an international software disease. Research shows that the effect of malware is becoming chronic. To protect against malware detectors are fundamental to the industry. The effectiveness of such detectors depends on the technology used. Therefore, it is paramount that the advantages and disadvantages of each type of technology are scrutinized analytically. This study's aim is to scrutinize...
Stereogram or autostereogram, frequently known as Magic Eye picture, is a two-dimensional (2D) image. Hidden inside each stereogram image is a floating object which appears in three-dimensional. We present a fully featured, web-based, online system that produces on-the-fly stereograms (or autostereograms) from a pair of side-by-side images. The system consists of three steps: (i) two side-by-side...
Adequate healthcare has always been a topic of concern in Bangladesh. As the population of Bangladesh is increasing exponentially, it has become impossible to deliver proper healthcare to all of its residence. For that reason alternate resources for healthcare have become almost a necessity today. Modern world is driven by technology and electronic healthcare system can be the solution we are looking...
In this paper, we studied the variability of 17 CAIDA Internet traffic traces which were collected in 2013, 2014, 2015 and 2016. The variability of these traces was measured by using the Index of Variability. Based on the results, we outlined several important observations. In particular, the Index of Variability has the ability to reveal significant differences between traffic traces. It is dynamic...
Financial services through the internet are running under various threats like phishing, pharming (cyber attack intended to redirect a website's traffic to another fake site), malware, and evolving sophistication of compromise techniques. Multi-factor authentication (MFA) financial service system alleviates the risk and makes it secure. Various methods of MFA run in troubles like the authentication...
Emerging trend of recent online marketing has lead researchers to discover a way for the e-commerce websites to support its large number of users in the best possible manner. Meeting up with user's satisfaction is a difficult task. This paper focuses on how user-modeling and recommendation by mouse-tracking can be used for construction of an intelligent e-commerce website that can identify and fulfill...
Information and communication technology (ICT) in education has become the strategies of all countries and economies around the world to achieve enriching human resources and rapidly developing economy and society. The purpose of the ICT in education is to cultivate innovative talents and implement the modernization of education. This paper utilizes the assessment results and questionnaire data of...
The purpose of this research is to identify factors of phishing victim based on the Heuristic Systematic Model and propose phishing awareness guidelines. In this research, the explanatory sequential mixed method is chosen. Therefore, survey and interview method been applied for data collection purpose. In summary, this research concluded that the major factors that influence user becomes a phishing...
"Proxies" are Internet applications that enable Internet users to connect to (or tunnel through) remote resources using another machine for two distinct purposes. First, they allow users to access remotely all resources in a network (i.e. Virtual Private Network or VPN). Second, they bring some level of anonymity by bouncing traffic around proxies. The latter model may enable Internet users...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.