The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
SQL Injection Attack (SQLIA) has been consistently ranked among the top security threats against web applications for more than a decade. Nowadays, attackers use sophisticated tools to launch automated injection attacks. The problem of prevention and detection of SQLIA has been long attended by the research community, but hardly any solution exists for protecting multiple websites in a shared hosting...
A Number of Dynamics such as on-demand and versatile cloud services, software interoperability standards, high bandwidth dynamic communication technologies, broad network access, virtualization technology, privacy and security measures made cloud computing so popular, where as Security is a key inhibitor to the cloud. In this paper we discussed different risks, threats and attacks. We focused on Advanced...
Mobile Ad Hoc Networks (MANETs) gained lot of importance due to fast growth of the businesses and used in different applications such as military, entertainment, commerce, emergency services etc. Because of openness and decentralization feature of the MANET, nodes of the MANET can be vulnerable to malicious entities. Hence, anonymity becomes one of the important aspects in MANET. In last few years,...
Penetration Testing is a security research and study of exploitation methods with counter measures to protect web applications from attacks and intruders. It is the art of exploiting the weakness that has been identified in the system under test. Identifying the insecure areas is the major task; the goal is to protect sensitive and the valuable data. All the safety vulnerabilities which are present...
With the flourishing availability and exercise of smart handsets in our everyday lives, mobile phone will soon become an elementary way to access many of the sophisticated applications and services in a very convenient as well as inviolable manner. The new technology i.e. Near Field Communication (NFC), provides the phone with an interface which allows it to act as a smart card reader. The proposed...
This Diabetic retinopathy poses a heavy threat to vision. Digital colored structure images can be used for distinguishing the eye structure. They produce a high-quality record of the structured image which is useful for detecting DR as primitive signs. Exudates are considered one in every of the earliest signs of DR. Ant colony optimization technique and Gabor filter approach is used for segmenting...
The ever increasing number of mobile broadband users requires the availability of enhanced data services. Long Term Evolution or LTE is the evolution of High Speed Packet Access (HSPA), which was standardized by third generation partnership project (3GPP) Release 8 in order to meet the increasing demand of faster and more efficient mobile internet access today by supporting the larger bandwidth. This...
Due to the development of the communication networks and mobile computing, location based service (LBS) becomes very popular in recent years. The Global Positioning Systems (GPS) are the earliest widely used modern systems for outdoor positioning service. However, GPS due to lack of LoS(Line Of Sight) cannot provide good accuracy in indoor environments since the satellite signals are blocked by building...
Vehicular Ad Hoc Network (VANET) is a subgroup of mobile ad hoc network (MANET). It is an emerging new technology to exchange information between vehicles to vehicles. VANETs are considered as one of the most noticeable technologies for improving the efficiency and safety of transportation systems. VANET mainly used to exchange traffic information between the vehicles and prevent accident. In VANETs...
The rapid growth in information science, information technology, and cloud computing play a vital role in the field of organizational management. The emerging and revolutionary benefits of using these techniques increases the use of organizational services. Cloud computing is an emerging field, which is a result of integration of programming methodologies, database technology, communication network...
In Social Media, code mixing and code switching take place where users often communicate in two or more languages. The state-of-the-art techniques fail when language identification is done on such code mixed informal texts due to the presence of lexical borrowings, creative spellings and phonetic typing. Therefore, automatic language identification for the code mixed social media texts has become...
The eSTREAM project [5] was established to choose new stream ciphers with comparison to existing ciphers (e.g. AES) as to provide a better alternative. The stream cipher Salsa20 [3] as a candidate of the eSTREAM project was accepted for the final phase and again successfully reviewed with 12 round. ChaCha is a variant of Salsa20 aiming at bringing better diffusion for similar performance. Significant...
With the development of weblogs and social networks, many news providers share their news headlines on different websites and weblogs. One of the main text mining topics is how to classify news into different groups. This study aims to classify news into various groups so that users can identify the most popular news group in the desired country at any given time. Based on Term Frequency-Inverse Document...
Wireless sensor network is a rapid developing area with diverse applications. Smartness and interoperability of network keeps it in high demand and hence comes need for the efficiency of the system. The most important limitation on sensor node is the low power consumption. Sensor nodes carry inadequate, generally irreplaceable power sources. Therefore, while traditional networks aim to achieve high...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.