A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Develop, implement, and improve a web session detection model
2014
Proceedings of the 5th Information Interaction in Context Symposium on - IIiX '14
My objective is to develop a session detection model with corresponding rules for each factor, and then embedded them into a Chrome Extension to automatically detect more accurate web sessions from log ...
Whilst comparably little work has involved the mental model about the "web session" from real users. ...
RESEARCH QUESTIONS My primary PhD research objective is to develop a web session detection model within a set of factors considered by people and implement it as a Chrome Extension to automatically detect ...
doi:10.1145/2637002.2637057
dblp:conf/iiix/YeWR14
fatcat:tk5w46y7kndozbg5ogvyb3seja
Table of Content
2022
2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)
Vision Models on Neuromorphic Fall Detection and Action Recognition Dataset 1570784179 Software Development Models for IoT SESSION 15: CLOUD COMPUTING AND AI 1570782774 Measuring Consistency Metric for ...
Under Dolev-Yao Threat 1570782508 Smart Helmet With Rear View and Accident Detection System for Increased Safety 1570783828 Modelling and Analysis of a Vertical Wall Robot for Ceiling Inspection SESSION ...
doi:10.1109/ccwc54503.2022.9720846
fatcat:2apzbkkdxbadbgvxuodexoeuua
Using Process Mining and Model-Driven Engineering to Enhance Security of Web Information Systems
2017
2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
In this paper, we propose a method based on Process Mining and Model-Driven Engineering to improve the security of Web information systems. ...
Due to the development of Smart Cities and Internet of Things, there has been an increasing interest in the use of Web information systems in different areas and domains. ...
ciber-ataques: Aplicando la minería de procesos y el diseño software orientado a la seguridad" [CyCriSec-TIN2014-58457-R], and "Developing Data-Intensive Cloud Applications with Iterative Quality Enhancements ...
doi:10.1109/eurospw.2017.66
dblp:conf/eurosp/BernardiAL17
fatcat:hhgqqk4bmvhehg64svj27ik3da
Web robot detection techniques: overview and limitations
2010
Data mining and knowledge discovery
Therefore, to aid in the development of a practically applicable robot detection technique, this survey presents a critical analysis and comparison of the prevalent detection approaches. ...
Finally, we discuss why the contemporary techniques fail to offer a general solution to the robot detection problem and propose a set of key ingredients necessary for strong Web robot detection. ...
In addition, a new HMM-based Web robot detection technique that incorporates our approaches to improve Web robot detection will be developed and analyzed. ...
doi:10.1007/s10618-010-0180-z
fatcat:p5y2lsboafhjjc6yg2lntflyjq
Web Personalization With Web Usage Mining Technics and Association Rules
2016
INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
As amount of information and web development increase considerably, some technics and methods are required to allow efficient access to data and information extraction from them. ...
Today website personalization is turned into a popular event for web users and it plays a leading role in speed of access and providing users' desirable information. ...
The proposed method sets forth the details of clustering pattern detection technics, association rule mining, extraction of order pattern and essential models in implementing joint data in web as an integrated ...
doi:10.24297/ijct.v15i1.1711
fatcat:t7ugnp3dkfb5toaouxa5mkv2py
Architectural Design of a Secured Web-Based Healthcare Portal
2018
Zenodo
Therefore, this research work intended to design defense architecture with security check point to detect the Web-request-level attacks by employing request blocker as the security check point. ...
Abstract—Web-based healthcare portal refers to the health-related services that are accessed over a network connection using Hyper Text Transfer Protocol (HTTP), rather than existing within a device's ...
Developing a secured Web-based healthcare portal is a complex and challenging task because the development adds additional layer of complexity during implementation. ...
doi:10.5281/zenodo.4451844
fatcat:ju6hudrtbrgxvbzin6gzuad43m
An Enhancement of Svm Based Semantically Enriched Variable Length Confidence Pruned Markov Chain Model Based Web Page Recommendation System
2020
International journal of recent technology and engineering
So in this paper, quickest change detection using Kullback-Leibler Divergence method is introduced to improve the accuracy of recommendation generation by developing a scalable quickest change detection ...
schemes that can be implemented recursively in a more complicated scenario of Markov model and it is included in the training data of SVM. ...
A technique and a framework was developed [10] for frequent web navigation patterns. ...
doi:10.35940/ijrte.e6927.018520
fatcat:mmcwqn2ncnfsvgxt2qk3nt6s5e
Dual Safeguard: Intrusion Detection and Prevention System in Web Applications
2013
International Journal of Computer Applications
In this paper, a Dual Safeguard Intrusion Detection and Prevention System was proposed to models the user network behaviors and create normality models of isolated user sessions across both frontend and ...
An Intrusion Detection Model for web applications based on Hidden Markov Model was also proposed. ...
There are a number of Online Transaction sites, Social Networking sites and other web portals were developed. ...
doi:10.5120/11421-6759
fatcat:vuidn43cfzgfxd26dvevvk7lp4
RBAC+: Protecting Web Databases With Access Control Mechanism
2012
INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY
In this paper, RBAC+ Model, an extension of NIST RBAC provides a application aware access control system to prevent attacks with the notion of application, application profile and sub-application session ...
With the wide adoption of Internet, security of web database is a key issue. ...
Proper access control policies can not be implemented for databases. Therefore, web applications are exposed to many illegal access and attacks that are very hard to prevent and detect. ...
doi:10.24297/ijmit.v2i1.1407
fatcat:asizaxy34jcbjhqlud2fwu2n4e
Modeling A Session-Based Bots' Arrival Process At A Web Server
2017
ECMS 2017 Proceedings edited by Zita Zoltay Paprika, Péter Horák, Kata Váradi, Péter Tamás Zwierczyk, Ágnes Vidovics-Dancs, János Péter Rádics
The aim of our analysis was to develop a model of a session-based bot arrival process on a Web server which may be then implemented in a bot traffic generator integrated with a Web server simulator. ...
As a result, interarrival times of bot sessions and interarrival times of requests in bot sessions were modeled by a Weibull and a Pareto distribution, respectively, and the numbers of requests in session ...
ACKNOWLEDGEMENT Grażyna Suchacka is a member of the consortium ICT COST Action IC1406 "High-Performance Modeling and Simulation for Big Data Applications" (cHiPSet). ...
doi:10.7148/2017-0605
dblp:conf/ecms/SuchackaW17
fatcat:d7yx62o2brchfn6mu63yqwwncy
SAISAN: An Automated Local File Inclusion Vulnerability Detection Model
2018
International Journal of Engineering & Technology
This paper has proposed an automated LFI vulnerability detection model, SAISANfor web applications and implemented it through a tool. 265 web applications of four different sectors has been examined and ...
Careless design and development of web applications are the key reasons for security breaches which are very alarming for the users as well as the web administrators. ...
This research has presented an automated LFI vulnerability detection model, SAISAN and implemented a tool based on the model, which is developed in Linux platform. ...
doi:10.14419/ijet.v7i2.3.9956
fatcat:mjbjipnuzrgiresyqswsfcp4g4
Table of Contents
2021
2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)
Malware Classification Using Quantised ResNets 11.5 1570762090 Twitter Sentiment Analysis in Covid-19 Pandemic 11.6 1570749109 Development of A Web Based Covid Portal and Marketplace SESSION 12: ARTIFICIAL ...
Implementation of Parameterized Real Time Color Based Object Tracking 1570761210 Face Mask Detection: A Real-Time Android Application Based on Deep Learning Modeling 1570762040 Tievs: Classified Advertising ...
doi:10.1109/iemcon53756.2021.9623133
fatcat:vf7xvqlhnfdnziz5pfsgroq36e
A Platform Specific UML model for Web application self defense through an Aspect Oriented Approach
2009
International Journal of Computer and Electrical Engineering
tampering and session hijacking attacks. ...
Invention of internet has paved a way for popularity of Web based applications. Web application vulnerabilities are a major concern for critical applications. ...
The work "A proposal and implementation of Automatic detection/collection system for Cross site scripting vulnerability" by Omar Ismail and Masahi Etoh [20] discusses the cross site scripting vulnerability ...
doi:10.7763/ijcee.2009.v1.69
fatcat:cuskldxdrnbctehtdzh3a6tsa4
Securing Web Application by Embedded Firewall
2012
Elektronika ir Elektrotechnika
The paper proposed an embedded web application firewall model based on a "black" and "white" lists of vulnerabilities which allows flexible and efficient development of Web applications firewalls, to assess ...
Developed and tested a prototype of a firewall, to show an advantage of embedded Web application firewall. Ill. 4, bibl. 21, tabl. 3 (in English; abstracts in English and Lithuanian). E. ...
EWAF model can be used in developing new or improving existing security measures on any web application platform. ...
doi:10.5755/j01.eee.119.3.1366
fatcat:wdsigcqczjgqvn5o6ywyyin4xu
Data mining for the analysis of content interaction in web-based learning and training systems
[chapter]
2006
Data Mining in E-Learning
Data mining is based on the detection and extraction of knowledge from a database. Web usage mining is a special form of data mining to address behaviour in Web sites. ...
We will introduce and illustrate a number of mining techniques that were developed specifically for the educational context. ...
Acknowledgements The author would like to thank the School of Computing and the Teaching and Learning Fund at Dublin City University for their support. ...
doi:10.2495/1-84564-152-3/03
fatcat:7a2777tusrhgzcsa4ycpkh6xzi
« Previous
Showing results 1 — 15 out of 80,336 results