The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A significant number of Moroccans use cybercafes on a regular basis for work and leisure. Unfortunately, if these cybercafe machines are infected with malware, such malware can steal users' passwords and other sensitive information. Assessing cybercafe security in Morocco can help assess the risk that users encounter when using cybercafes. However, to the best of our knowledge, there is no academic...
In 1986, this author presented a paper at a conference, giving a sampling of computer and network security issues, and the tools of the day to address them. The purpose of this current paper is to revisit the topic of computer and network security, and see what changes, especially in types of attacks, have been brought about in 30 years. This paper starts by presenting a review of the state of computer...
In this paper, we consider some educational aspects related to mathability. Our main goal is to approach an answer to the question what are computer assisted ways to assimilate mathematical knowledge and possess mathematical abilities.
In this paper, we implement a video effect process allocation scheme for Internet live broadcasting. Recently, Internet live broadcasting services have widely spread. In the Internet live broadcasting services, users add special effects to videos in real time. However, a delay occurs to process and broadcast videos because of the poor performances of users' devices. Therefore, we have proposed a method...
Typing CAPTCHA is usually troublesome and is unpleasant for the users. But the security of some of the websites depends on it and causes that human being is distinguished from robots facing with different websites. Filling CAPTCHA by humans can be used effectively like electronization of books and different texts. In this article it has been attempted to examine using image processing for converting...
ICT/technologies are increasingly pervasive and embedded in everyday things and objects, constituting a relevant aspect of social identities. Furthermore ICT use continues to be a highly gendered area of life in all socio-economic and educational backgrounds, and a source of significant social inequality in enduring ways. Gender and ICT/technologies is an international growing field of research that...
Every year, companies are searching for professionals in cybersecurity more than ever before; however, there is a big void in the pipeline. Interestingly enough, the largest source of security incidents are unintentional insiders, which demonstrates the need for cybersecurity education not only for developing cybersecurity workforce but also to raise mere awareness and consciousness about these issues...
In order to be able to successfully defend an IT system it is useful to have an accurate appreciation of the cyber threat that goes beyond stereotypes. To effectively counter potentially decisive and skilled attackers it is necessary to understand, or at least model, their behavior. Although the real motives for untraceable anonymous attackers will remain a mystery, a thorough understanding of their...
Digital Forensics is a branch of forensic science. Today the internet users continue to grow day by day, therefore crimes related to the internet also increases. The process of digital forensic is using digital devices to extract the information and identify whether the device has been hacked before or being viewed. The prime objective of Digital Forensic is to gather the “evidence” of crime scene...
The purpose of this paper is to adapt a few sentiment analysis methods to obtain sentiment value for social network statements in the Polish language. Developed methods represent different approaches. Starting with PMI-IR, expansion of dictionary through conjunctive connections method, to determining bigram sentiment by analyzing its neighborhood. Obtained results were compared to the commercial solution...
In order to better understand the emergence of online social networks, researchers usually employ state of the art synthetic topological models which can replicate some of the observed real-world social network characteristics. However, these characteristics rely on the analysis of common graph metrics at a certain point in time, when the snapshot of the real-world data is obtained. In other words,...
The paper gives some basic view on use of multimedia when teaching foreign language. The concept of multimedia in connection with education process involves a few technical didactical instruments, which during the school supplies development appeared as a part of educational process. In classical education the most used sense in absorbing information is hearing. With the use of multimedia is the most...
Firewall is a standard security utility within the Microsoft Windows operating system. Most Windows users adopt it as the default security option due to its free availability. Moreover, Windows Firewall is a widely used security tool because of the large market share of the Microsoft Windows operating system. It can be customised for filtering of network traffic based on user-defined inbound and outbound...
Cyberization, as a new big trend following computerization and informatization, is the process of forming a new cyberworld and transforming our current physical, social and mental worlds into novel cyber-combined worlds. Cyber science, responding to the cyberization trend, aims to create a new collection of knowledge about these cyber-enabled worlds, and provide a way of discovering what is in the...
This paper present to develop long range formation control for unmanned aerial vehicles (UAVs) to broaden UAV operation region. Operation region of a small UAV is often limited within a line of sight propagation due to limited wireless network and communication. Most common wireless networks have a high bandwidth but require a clear line of sight without any obstacles. Recently, a number of researches...
IoT based traffic congestion control unit design increases the service efficiency of the police personnel. Careful investigation is done to develop a work flow process for a real time traffic monitoring unit. Enhanced functionality in the design is provided using multitasking design capability in term design of both. Sensing traffic and alert service providing unit. A knowledge eco system is developed...
We studied how Internet Service Providers (ISPs) are involved in botnet mitigation in the Netherlands. Although Dutch ISPs on average perform very well with respect to botnet mitigation, botnets still are a significant threat and many end-user systems are infected by bot-malware. We created a reference model which summarizes measures for botnet mitigation from scientific literature that ISPs can take...
Internet usage is rising at a frenzied rate as knowledge and information sharing becomes easy and time-saving. Regrettably, the visually impaired do not enjoy this liberty and they have difficulties in using the computer and the Internet to obtain any shared and published information. This difficulty is also faced by the visually impaired Bahasa Melayu (BM) language medium Internet users. Existing...
Recent technological advancement in mobile technologies had changed the learning process for urban poor group in Malaysia. However, the main problem is lacking of understanding of the factors that drive urban poor to use m-learning. Thus, the main objectives of this exploratory research are (i) to identify the factors that drive urban poor to use m-learning and (ii) to provide recommendations to improve...
This paper compares the probability similarities between a cyberattack, the distributed denial-of-service, and the mathematical model of probability, Lévy walks. This comparison aims to explore the validity of Lévy walks as a model resembling the DDoS probability features. This research also presents a method, based on the Smirnov transform, for generating synthetic data with the statistical properties...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.