The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Digital forensic investigations has become an important field in this era due to the raise of cybercrimes. Therefore, most governments and companies found the urgent need to invest more in research related to digital forensic investigations. To perform digital forensic investigations covering extraction, analysis, and reporting of digital evidences, new methods and techniques are required. One of...
In recent years, computer system capability training becomes an important research issue for teaching reforms of computer major. This paper propose a new system ability training scheme via analyzing the existing reform methods. By establishing core courses and optimizing experimental teaching system, our reform completes the teaching target that let undergraduate students to develop a CPU, an operating...
Clocks have a small in-built error. As the error is unique, each clock can be identified. This paper explores remote computer identification based on the estimation of clock skew computed from network packets. The previous knowledge of the method is expanded in various ways: (1) we argue about the amount of data that is necessary to get accurate clock skew estimation, (2) the study of different time...
The advantages of avionics switched network in network scale and flexibility greatly improve the communication performance of avionics network, promote the development of IMA/DIMA technology and also increase network scale and complexity. Meanwhile, requirements for the management of the avionics system are also on the rise. In this paper, the characteristics of SNMP protocol and airborne switched...
Operating system is essential to operate computers. Normally, computers come with preloaded operating systems. However, often the preloaded operating systems are not able to fulfill all requirements of users. The users sometimes need to change the operating system based on their needs. Although some comparative studies and tools are available on operating systems, there is still a lack of tools that...
This paper proposes a detection system for malicious apps in the Android mobile phones. The proposed system mainly extracts permissions and sensitive functions applied by an app, plus two additional features native-permissions and intent-priority, to conduct static analysis. Besides, the system also uses a sandbox, i.e., an emulator, to record and analyze the app's behavior. For the latter, this study...
Most of the courses should be evaluated time to time in order to determine if the objectives of the degree are keeping reached. In this paper, the steps to update a course of Computer Architecture of the first year of the degree in Telecommunication Technologies Engineering of the University of Vigo (Spain) are described.
Private browsing is popular for many users who wish to keep their internet usage hidden from other users on the same computer. This research examines what artefacts are left on the users' computer using digital forensic tools. The results from this research help inform recommendations for forensic analysts on ways to analyse private browsing artefacts.
This paper focuses on the time analysis of different matrix multiplication algorithms. In the paper, the methods invented by Karatsuba and Strassen are analyzed and implemented; theoretical and real time is calculated. Afterwards the Karatsuba and the Strassen algorithms are merged, and combining these two algorithms a new approach is designed, which can be considered as a method for reducing the...
Malware are the big threat within the digital world as they have a highly complex technological structure that is capable of penetrating networks, obtaining confidential information from personal computers and corporate systems, and even of making systems of critical infrastructure vulnerable. However, in order to achieve their objectives, they need to remain updated, so that they will not be detected...
History has shown that attacks against network-connected software based systems are common and dangerous. An important fraction of these attacks exploit implementation details of the software based system. These attacks - sometimes called low-level attacks - rely on characteristics of the hardware, compiler or operating system used to execute software programs to make these programs misbehave, or...
When performing the internal audit of computer equipment an important problem is to identify the elf (executable and linkable format) files stored on the investigated hard drive. To solve this problem, we propose a method of identification of unknown elf-ffles based on the metric classification algorithms. The method consists of three stages. On the first stage the preparation of the training sample...
Hardware management and resource tracking is an important activity in maintaining labs at institute and offices. The resources are spread across various labs; some of the systems are at different location of the office. The monitoring of these systems is itself a tedious task. In this paper a ‘Resource Tracker’ methodology is proposed that provides a method to track remote resources by identifying...
One of the most promising areas in Computer Engineering is certainly that of the Internet of Things (IoT) Systems. Moreover, such systems can be efficiently implemented in current Field Programmable Gate Arrays (FPGAs) comprising of either soft-core or hard-core CPUs. The design of an IoT system comprises of developments in both hardware and software whereas a productive IoT Systems Designer should...
The paper presents method of classification of user and system data based on the attributes. The method is intended to solve the problem of data classification in the internal audit of computer equipment with a large volume of data stored on the media. The parametric space of informative features for the classification task is defined. To conduct internal audit of computer technologies in order to...
Wi-Fi is a local area wireless networking technology that is widely used for different purposes such as data transmission and wireless communication. Wi-Fi connection will most often result in faster, more reliable internet access and it is cheap. A penetration test on Wi-Fi is a proactive and authorized attempt to evaluate the security of an IT infrastructure by safely attempting to exploit system...
File is a super abstraction of hypothetically huge volume of information stored in containers (disk blocks) which is persists for very long time (memory abstraction). File is linear Array of bites and blocks of bytes accessed by multiple clients which is controlled by File system. File System function is disk seek, read maximum information from container and maps file names and offsets to disk blocks...
The N-Queens problem has been studied for over a century. The N-Queens problem may be solved using a variety of methods including backtracking algorithms and mathematical equations such as magic squares. We propose a more efficient approach to the most used technique, backtracking, by removing the threatened cells in order to decrease the number of trial and error steps.
Aimed at solving the problem of low-level intelligence and low utilization of audit logs of the security audit system, a secure audit system based on association rule mining is proposed in this paper. The system is able to take full advantage of the existing audit logs, establish the behavior pattern database of users and the system with data mining technique, and discover abnormal situation in a...
Windows 7 is a personal computer operating system developed by Microsoft Corporation, and it belongs to Windows NT family. This paper concentrates on the topic of analyzing the security level of Windows 7 Operating System, and security level of the information system highly depends on the operating system. To estimate the security grade of Windows 7 operating system, we use the graph model to describe...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.