The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data characteristics stored in the database evolve over the time. Nowadays, it is inevitable to store all states of the objects over the time. Paradigms of conventional database are based on managing actual states, which are inappropriate. Therefore, temporal approach has been developed. In this paper, we deal with our proposed temporal solution based on attribute level architecture, which can be...
Mine security detecting crawling robot is a kind of remote-controlled security detecting robot with multiple sensors, which can replace human work in such complex environments as special places of coal mines, undesirable conditions unaccessible to humans or disasters of fire, earthquake and mining. It can carry out medium range search, fixed-point detection, real-time data transmission in a remote...
This report describes an ongoing Russian research program, which aimed at development of a methodological framework for a nation-wide multi-hazard crisis management «system of systems» (SoS) for built environment. In addition to a currently available system of separate departmental legacy cyber systems, targeted, mainly, at disaster response and recovery only, the proposed SoS shall provide a shared...
MPSoCs are able to support multiple applications on the same chip. This flexibility offered by the MPSoC also represents a vulnerability, turning the MPSoC security specially challenging. The goal of the designers is to provide MPSoC protection that meets the performance and security requirements of all the applications. The Network-on-chip (NoC) interconnection structure can be used to efficiently...
Cloud computing has changed the whole picture that distributed computing used to present e.g. Grid computing, server client computing. Cloud has given a new meaning to distributed, and off-premises computing. Although, Cloud offers great benefits, it also introduces a myriad of security threats to the information and data which is now being ported from on-premises to off-premises. Where cloud computing...
In this paper, we propose a new design with high-level security and low-cost implementation for different network topologies. Achieving both factors at the same time is a challenging work for network experts, especially when they want to apply defense in depth strategy in various components of their networks. Offered scenario has been done for one of the most visited web sites in an Iranian organization...
Web application has become one of the main network applications. The security in web application systems is very important. In this paper we present a method for tracking suspicious users based on web data analysis. Based on a browser/server model, internet flow data are stored in the server and outliers considered as the suspicious users are detected with web data analysis. The behaviors of these...
Uganda is one of the countries south of the Sahara that has smart system of administration based on decentralization. It has been declared that this decentralisation system is very efficient in service delivery, because it provides opportunities for the masses to get involved in governing themselves at lower levels of the community they live in.
With the growth of network connectivity and network sizes, the interest in traffic classification respectively attack and anomaly detection in network monitoring and security related activities have become very strong. In this paper, a new tool called DANAK has been developed for the detection of anomalies in Netflow records by referring to spatial and temporal information aggregation in combination...
The forest is the main body of the land ecological system, is the physical infrastructure for human society to survival and development, forest resources security problems have a great influence on the sustainability of forestry and the national economy development, which have received china and the international community's great concern. By reference to the seventh national forest inventory results,...
In the past, control networks were completely isolated from exterior attack with the use of proprietary control protocols running on specialized hardware and software. Since then, TCP/IP based systems have made their way into the industrial control system. Control networks based on TCP/IP provide better connectivity and remote access capabilities, making the industrial control system vulnerable to...
This paper summarized applications of Fire Wall in e-Commerce security system and have set forth choice principle on fire wall; have studied e-Commerce network security technique on Fire Wall; analysed constructing e-Commerce network security technology and applied to actual e-Commerce system design on power.
Green computing technology has been consideredupon different aspects in IT such as reducing the complexity of systems, limitations in physical environment, decreasing costs and reducing energy consumption. Virtualizationtechnology and a security solution to analyze the traffic between Virtual Machines(VMs)have been researched in previousgreen IT papers. The main objective of this work isnot only to...
In this paper we propose a solution to strengthen the security of Domain Name System (DNS) servers associated with one or more Top Level Domains (TLD). In this way we intend to be able to reduce the security risk when using major internet services, based on DNS. The proposed solution has been developed and tested at FCCN, the TLD manager for the. PT domain. Through the implementation of network sensors...
The JavaScript language is an interpretive programming language which is used to enhance the client-side interactivity and functionality. However, it has been much exploited by malicious parties to launch browser-based security attacks. Currently there are many security vulnerabilities assessment tools, and browsers provide sand-boxing mechanisms to protect the JavaScript code from compromising the...
The system of WebMail content and attachments recovery can monitor the network without affecting the performance of the network, check the network for confidential information leakage phenomenon. if found it will store the leak records into the hard disk automatically which will be used as evidence for security sectors. This paper introduces in detail the design and implementation of the WebMail content...
Grid portal is a secure web environment where user can monitor and execute grid applications, access grid resources, services, and collaborate with other users. A grid portal allows an organization to have a single URL that enables users to gain browser-based access to applications and any customized information in a virtualized, unified and secure way. The main requirement for this grid portal is...
Informatization is an important feature of smart grid. With the construction of smart grid and the constant depth development of electric power information, the information networks of electric power have been continued to invade by all kinds of network threats. Traditional information security protection system for electric power had been unable to meet the security threats demand of ever changing...
This paper proposes the virtual honeynet collaboration system (VHS) to improve the designs and concepts of the honeynet architectures. Using virtualization technologies (VTs) as a development platform, the proposed approach combines honeynet technologies to develop a new virtual honeynet architecture that implements VHS. This study also proposes the honeypot redirect-outbound (HRO) algorithm and the...
Electric Power Information Networks are the infrastructure, which not only ensures electric power system operating securely as well as stably, but also promotes power companies'effective and continuable run. Electric power dispatch systems, management information systems, customer relation systems and so on, are all built on this infrastructure. It is an important task for network administrators of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.