The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
W artykule zaprezentowano analizę podatności systemów bazodanowych na ataki typu SQL Injection. Praca rozpoczyna się od przedstawienia charakterystyki analizowanego ataku w kontekście baz danych. Bazy danych, pomimo kluczowego znaczenia w infrastrukturze wszelakich systemów odznaczają się niedostatecznym poziomom zabezpieczeń, co w konsekwencji może prowadzić do poważnych strat. Podstawowym zagrożeniem...
PHP and MYSQL has been the main web development tool for it is free and open source. The authors have discussed the environmental issues in development process based on PHP and MYSQL and the implementation process of the website ZhuoQi.
Accident is originated by hidden danger. Discovering and removing hidden dangers is one main approach to prevent and control accidents. This paper collected and analyzed the information of hidden dangers from multiple coal mines. On that basis, we put forward concepts of hidden danger information and standard database of hidden danger information, introduced the structure and build flow chart of standard...
In order to improve the stability, validity and reliability of network management, the management architecture of multi-agent network is analyzed, and the communication and language between the multi-agent are introduced. Finally, a Distributed Network Management Framework based on multi-agent is presented. The functions of each module and mutual cooperation process in the framework are outlined....
With the development of database technology and the popularity of Internet, the database applications have been increasingly widespread; we must face on some serious database security. The database system is the aggregates of the message, and it is the core components of the computer message system. The security of database is very important; it is related to the success of enterprise and national...
According to the low efficiency of system testing, the longer test cycle, the single form of the test results, no standardized documents of tested results and other drawbacks of the traditional penetration testing system, this paper design and implement of an XML-based penetration testing system. The system uses SNMP, PING, Telnet and other ways to explore resource, is based on OVAL, CVE to assess...
We have developed reliable web applications based on the web services technology on J2EE and .NET. Web applications implemented using web services are platform and language independent. The web services are available from several servers on different platforms so that the users can have a truly dynamic web services environment with autonomous services with underline server and user credential context...
In the Age of Information, network education pays more attention to the application of IT technology and the training of talents, which makes learning more of customization and of opening up. In order to better enable learners to go beyond the limitations of space and time to acquire knowledge; in order to provide excellent learning environment for greater freedom and greater choice of learning activities...
With the development of society, more and more emphasis put on community safety, Community Safety Manager plays an important positive role in maintaining social safety and stability and the promotion of social harmony. Therefore, How to implement the innovative model of community management system, strengthening grass-roots development and democratic self-government building and improve the city economic,...
Focused on the present status that the algorithm of measuring time-series distance is many but the appropriate algorithm of measuring multiple granularities time-series is few, the paper advanced a similarity matching algorithm of multiple granularities time-series based on the ideal of time calibrator and hypothesis test. It firstly expounded the definition of multiple granularities time-series,...
Everyone has physiological preference regarding micro-climate conditions such as temperature, humidity and illumination, therefore, personalized micro-climate control could certainly enhance human comfort level in building interior space. 25% of the total national energy consumption is related with buildings, so reducing building operation energy is also necessary. Consequently, innovative sensing...
It's convenient for people's communication by Internet's rapid growth. Tengxun QQ is IM with excellent function using by large amount of Internet users and because of its large cardinal number of users, it becomes a target which is attacked by many Internet illegal users. This paper firstly introduces us QQ virus and their classification, virus phenomenon and several solutions about attacking for...
To overpass the speed gap between processor and main memory; cache memory is used. Cache memory is having hierarchical structure, including level 1 cache (L1), level 2 cache (L2) etc. Effective page replacement algorithm will result in effectual utilization of cache. L1 is having rich temporal locality while L2 is having poor temporal locality, thus same replacement algorithms for both the levels...
Since Java web applications are used widely in Internet today, the security of it becomes an outstanding problem. The attacks, including SQL injection attack, XSS attack, and etc, are great challenges for the Java application. This paper presents the vulnerability analysis framework to detect the security hole in the Java web applications. The framework combines the techniques of the static points-to...
The important issue in multi-class classification on support vector machines is the decision rule, which determines whether an input pattern belongs to a predicted class. To enhance the accuracy of multi-class classification, this study proposes a multi-weighted majority voting algorithm of support vector machine (SVM), and applies it to overcome complex facial security application. The proposed algorithm...
The Avert-IT project (EU FP7) is an initiative to develop a system that can predict the onset of hypotensive events in patients over a feasible timescale (e.g. 15 mins) and allow clinicians to administer the appropriate treatment. To produce this system requires the additional development of a data collection platform, based at six leading clinical centres throughout Europe, with real-time integration...
It is very important to protect the data security in distributed Web applications. In this paper, a file content tamper-proofing system is proposed, which can effectively resist file content tampering, and prevents illegal information spreading. To meet the requirement of authentication speed, a fast authentication algorithm combines file length verification and HMAC is used in the file content tamper-proofing...
The encryption mechanism is an effective way to protect the sensitive data in database from various attacks. When the data is encrypted, the query performance degrades greatly. How to query encrypted data efficiently becomes a challenge. In this paper, a scheme to support query over encrypted data is proposed. Firstly, we extend two-phase framework to complete query, constructing different indexes...
Numerous authentication protocols for RFID systems were proposed as attempt to prevent unauthorized tracking and monitoring, impersonation or cloning, and information leakage. Many of such attempts cannot establish essential requirements that one robust authentication protocol must guarantee. In this paper, we propose a rapid mutual authentication protocol, called FLMAP, that overcomes all the drawbacks...
Recent attacks demonstrated that network intrusions have become a major threat to Internet. Systems are employed to detect internet anomaly play a vital role in Internet security. To solve this problem, a technique called frequent episode rules (FERs) base on data mining has been introduced into anomaly detection system (ADS). These episode rules are used to distinguish anomalous sequences of TCP,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.