The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to solve the balance problems between efficiency and accuracy encountered in content-based video retrieval, in this paper, we propose firstly a video retrieval scheme based on coarse granularity. To achieve the coarse-grained video retrieval, we use inverted index. Further, we expose an improved BLAST algorithm to realize fine-grained retrieval of video fingerprint. Finally, simulation results...
As a product of the development of the Internet, security issues of cloud computing has attracted much attention whether it is from the cloud providers' point of view or from the perspective of cloud users. From the view of information security, risk assessment model is established in this paper using game theory, which involves the damage and the restore of the cloud system. Using the framework,...
Cloud Computing has recently emerged as a computing paradigm for delivering IT resources as services over the internet. However, there still exist significant problems with regard to secure delivery of services using Cloud-based IT resources. As long as malicious virtual machines could affect its host and other machines, the virtual machine placement is an important issues. In this paper, we outline...
Interplanetary Network defines the architecture and protocols necessary to permit inter-operation of the Internet residents or systems on earth/spacecrafts with other remotely located Internet resident/systems on other systems/spacecrafts in transit in the hostile and unpredictable environment of space. Inter-networking in such environment requires new techniques other than traditional communication...
This paper addresses the rapidly increasing issue of sensitive user data theft and the data incongruity due to Web Content Management System (WCMS) structure and very complex WCMS to WCMS conversion procedure. After retaining the full picture of the situation, the paper approaches a solution for securely accessing, modifying and migrating WCMS database(DB) using a precise information hiding and data...
As more and more databases are published on the internet nowadays, it is increasingly important to maintain the security of published databases. In this paper, we propose a distortion-free scheme for embedding and verifying integrity information for relational databases. The proposed scheme does not require any additional storage to store the integrity verification information, nor does it introduce...
Trust and security are key enablers of the information society. Trust is an important aspect of decision making for Internet applications and particularly influences the specification of security policy. It addresses issues on who is authorised to perform actions as well as the techniques needed to manage and implement security in the applications. Trust relates to belief in honesty, truthfulness,...
Detecting, filtering and blocking the illegal and inappropriate content on the Internet by using Internet content rating technology are important for Internet cultural security, but the lack of relevant technical standards impedes the industrialization and large-scale applications of this technology seriously. To solve this problem, this paper discusses how to establish the Internet Content Rating...
As the applications of mobile and ubiquitous technologies have become more extensive, the communication security issues of those applications are emerging as the most important concern. Therefore, studies are active in relation with various techniques and system applications for individual security elements. In this paper, we proposed a new technique which uses the voice features in order to generate...
Network Finance brings great changes and conveniences to enterprise at network economy age, at the same time, but security issues have been the biggest constraint to their development, so how to build the control system of network financial security is an important issue which is urgently in-depth studied. In this paper, the control system of network financial security is constructed systematically...
The following topics are dealt with: Internet; crowdsourcing; software engineering; cyber security; successive iterative decoding; correlated Rayleigh fading envelope; pseudorandom phase generation; nonuniform signal constellation; network coding; mobile Web service; mobile Web services; fault tolerant architecture; context aware approach; arabic language processing; smart grid; video techniques;...
The expansion of the Internet has made web applications become a part of everyday life. As a result the number of incidents which exploit web application vulnerabilities are increasing. A large percentage of these incidents are SQL Injection attacks which are a serious security threat to databases with potentially sensitive information. Therefore, much research has been done to detect and prevent...
The expansion of internet technology has made convenience. On the one hand various malicious code is produced. The number of malicious codes occurrence has dramatically increasing, and new or variant malicious code circulation very serious, So it is time to require analysis about malicious code. The being so malicious code pattern extract for malicious code properties of anti-virus company. Visualization...
At present, Thai e-Tailer discover a chance for operating their business in popularly type of virtual merchant via internet channel. Unfortunately, Thai e-Tailer faces to a problem concerning to the low level of trust for making an internet activity in view point of customer. Therefore, this document studied to e-Tailer: virtual merchant regarding to common threat and technological solution on e-Tailer...
The current and future dynamic development and innovation in the field of Information Communications Technologies (ICT) create a platform for the ubiquitous connectivity via Cyberspace for anywhere at any time for anyone worldwide. Having millions of people all over the planet, connected to the Internet via his/her PC, laptop, or any portable mobile device create opportunities for communication all...
Analyzing and processing complex information by using computer aim at mine ventilation manage system in coal mine, this paper put forward feasible and reliable technical decision to the urgent requirements of coal mine safe technology and locale status. By studying middle component and application server, the design approach of building coal mine ventilation safe information network centered on safe...
With the advent of Internet of Things (IoT), information security issues will be a major bottleneck of the future development of IoT. How to resolve the information security problems of IoT effectively has become an important research issue. Firstly, various potential information security issues and preventive measures in the application of IoT are summarized. Then, the general architecture of trusted...
The following topics are dealt with: distributed and parallel computing; semantic Web; mobile networks; peer-to-peer computing; sealable computing; Internet; opportunistic and delay tolerant networks; agent and dependable systems; intelligent computing; communication networks; service oriented architecture; security; wireless sensor networks; privacy; ad hoc networks; life science modeling and computing;...
Malicious web pages are an emerging security concern on the Internet due to their popularity and their potential serious impacts. Detecting and analyzing them is very costly because of their qualities and complexities. There has been some research approaches carried out in order to detect them. The approaches can be classified into two main groups based on their used analysis features: static feature...
Internet of Things (IoT) consists of several tiny devices connected together to form a collaborative computing environment. IoT imposes peculiar constraints in terms of connectivity, computational power and energy budget, which make it significantly different from those contemplated by the canonical doctrine of security in distributed systems. In order to circumvent the problem of security in IoT...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.