Filters








80,336 Hits in 3.8 sec

Develop, implement, and improve a web session detection model

Chaoyu Ye, Max L. Wilson, Tom Rodden
2014 Proceedings of the 5th Information Interaction in Context Symposium on - IIiX '14  
My objective is to develop a session detection model with corresponding rules for each factor, and then embedded them into a Chrome Extension to automatically detect more accurate web sessions from log  ...  Whilst comparably little work has involved the mental model about the "web session" from real users.  ...  RESEARCH QUESTIONS My primary PhD research objective is to develop a web session detection model within a set of factors considered by people and implement it as a Chrome Extension to automatically detect  ... 
doi:10.1145/2637002.2637057 dblp:conf/iiix/YeWR14 fatcat:tk5w46y7kndozbg5ogvyb3seja

Table of Content

2022 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC)  
Vision Models on Neuromorphic Fall Detection and Action Recognition Dataset 1570784179 Software Development Models for IoT SESSION 15: CLOUD COMPUTING AND AI 1570782774 Measuring Consistency Metric for  ...  Under Dolev-Yao Threat 1570782508 Smart Helmet With Rear View and Accident Detection System for Increased Safety 1570783828 Modelling and Analysis of a Vertical Wall Robot for Ceiling Inspection SESSION  ... 
doi:10.1109/ccwc54503.2022.9720846 fatcat:2apzbkkdxbadbgvxuodexoeuua

Using Process Mining and Model-Driven Engineering to Enhance Security of Web Information Systems

Simona Bernardi, Raul Piraces Alastuey, Raquel Trillo-Lado
2017 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)  
In this paper, we propose a method based on Process Mining and Model-Driven Engineering to improve the security of Web information systems.  ...  Due to the development of Smart Cities and Internet of Things, there has been an increasing interest in the use of Web information systems in different areas and domains.  ...  ciber-ataques: Aplicando la minería de procesos y el diseño software orientado a la seguridad" [CyCriSec-TIN2014-58457-R], and "Developing Data-Intensive Cloud Applications with Iterative Quality Enhancements  ... 
doi:10.1109/eurospw.2017.66 dblp:conf/eurosp/BernardiAL17 fatcat:hhgqqk4bmvhehg64svj27ik3da

Web robot detection techniques: overview and limitations

Derek Doran, Swapna S. Gokhale
2010 Data mining and knowledge discovery  
Therefore, to aid in the development of a practically applicable robot detection technique, this survey presents a critical analysis and comparison of the prevalent detection approaches.  ...  Finally, we discuss why the contemporary techniques fail to offer a general solution to the robot detection problem and propose a set of key ingredients necessary for strong Web robot detection.  ...  In addition, a new HMM-based Web robot detection technique that incorporates our approaches to improve Web robot detection will be developed and analyzed.  ... 
doi:10.1007/s10618-010-0180-z fatcat:p5y2lsboafhjjc6yg2lntflyjq

Web Personalization With Web Usage Mining Technics and Association Rules

G. Kazeminuri, A. Harounabadi, J. Mirabedini
2016 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY  
As amount of information and web development increase considerably, some technics and methods are required to allow efficient access to data and information extraction from them.  ...  Today website personalization is turned into a popular event for web users and it plays a leading role in speed of access and providing users' desirable information.  ...  The proposed method sets forth the details of clustering pattern detection technics, association rule mining, extraction of order pattern and essential models in implementing joint data in web as an integrated  ... 
doi:10.24297/ijct.v15i1.1711 fatcat:t7ugnp3dkfb5toaouxa5mkv2py

Architectural Design of a Secured Web-Based Healthcare Portal

Rotimi-Williams Bello
2018 Zenodo  
Therefore, this research work intended to design defense architecture with security check point to detect the Web-request-level attacks by employing request blocker as the security check point.  ...  Abstract—Web-based healthcare portal refers to the health-related services that are accessed over a network connection using Hyper Text Transfer Protocol (HTTP), rather than existing within a device's  ...  Developing a secured Web-based healthcare portal is a complex and challenging task because the development adds additional layer of complexity during implementation.  ... 
doi:10.5281/zenodo.4451844 fatcat:ju6hudrtbrgxvbzin6gzuad43m

An Enhancement of Svm Based Semantically Enriched Variable Length Confidence Pruned Markov Chain Model Based Web Page Recommendation System

2020 International journal of recent technology and engineering  
So in this paper, quickest change detection using Kullback-Leibler Divergence method is introduced to improve the accuracy of recommendation generation by developing a scalable quickest change detection  ...  schemes that can be implemented recursively in a more complicated scenario of Markov model and it is included in the training data of SVM.  ...  A technique and a framework was developed [10] for frequent web navigation patterns.  ... 
doi:10.35940/ijrte.e6927.018520 fatcat:mmcwqn2ncnfsvgxt2qk3nt6s5e

Dual Safeguard: Intrusion Detection and Prevention System in Web Applications

M. Sujitha, P. Suganya, T. Shampavi, S. Anjanaa
2013 International Journal of Computer Applications  
In this paper, a Dual Safeguard Intrusion Detection and Prevention System was proposed to models the user network behaviors and create normality models of isolated user sessions across both frontend and  ...  An Intrusion Detection Model for web applications based on Hidden Markov Model was also proposed.  ...  There are a number of Online Transaction sites, Social Networking sites and other web portals were developed.  ... 
doi:10.5120/11421-6759 fatcat:vuidn43cfzgfxd26dvevvk7lp4

RBAC+: Protecting Web Databases With Access Control Mechanism

Archna Arudkar, Vimla Jethani
2012 INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY  
In this paper, RBAC+ Model, an extension of NIST RBAC provides a application aware access control system to prevent attacks with the notion of application, application profile and sub-application session  ...  With the wide adoption of Internet, security of web database is a key issue.  ...  Proper access control policies can not be implemented for databases. Therefore, web applications are exposed to many illegal access and attacks that are very hard to prevent and detect.  ... 
doi:10.24297/ijmit.v2i1.1407 fatcat:asizaxy34jcbjhqlud2fwu2n4e

Modeling A Session-Based Bots' Arrival Process At A Web Server

Grazyna Suchacka, Daria Wotzka
2017 ECMS 2017 Proceedings edited by Zita Zoltay Paprika, Péter Horák, Kata Váradi, Péter Tamás Zwierczyk, Ágnes Vidovics-Dancs, János Péter Rádics  
The aim of our analysis was to develop a model of a session-based bot arrival process on a Web server which may be then implemented in a bot traffic generator integrated with a Web server simulator.  ...  As a result, interarrival times of bot sessions and interarrival times of requests in bot sessions were modeled by a Weibull and a Pareto distribution, respectively, and the numbers of requests in session  ...  ACKNOWLEDGEMENT Grażyna Suchacka is a member of the consortium ICT COST Action IC1406 "High-Performance Modeling and Simulation for Big Data Applications" (cHiPSet).  ... 
doi:10.7148/2017-0605 dblp:conf/ecms/SuchackaW17 fatcat:d7yx62o2brchfn6mu63yqwwncy

SAISAN: An Automated Local File Inclusion Vulnerability Detection Model

Md Maruf Hassan, Touhid Bhuyian, M Khaled Sohel, Md Hasan Sharif, Saikat Biswas
2018 International Journal of Engineering & Technology  
This paper has proposed an automated LFI vulnerability detection model, SAISANfor web applications and implemented it through a tool. 265 web applications of four different sectors has been examined and  ...  Careless design and development of web applications are the key reasons for security breaches which are very alarming for the users as well as the web administrators.  ...  This research has presented an automated LFI vulnerability detection model, SAISAN and implemented a tool based on the model, which is developed in Linux platform.  ... 
doi:10.14419/ijet.v7i2.3.9956 fatcat:mjbjipnuzrgiresyqswsfcp4g4

Table of Contents

2021 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON)  
Malware Classification Using Quantised ResNets 11.5 1570762090 Twitter Sentiment Analysis in Covid-19 Pandemic 11.6 1570749109 Development of A Web Based Covid Portal and Marketplace SESSION 12: ARTIFICIAL  ...  Implementation of Parameterized Real Time Color Based Object Tracking 1570761210 Face Mask Detection: A Real-Time Android Application Based on Deep Learning Modeling 1570762040 Tievs: Classified Advertising  ... 
doi:10.1109/iemcon53756.2021.9623133 fatcat:vf7xvqlhnfdnziz5pfsgroq36e

A Platform Specific UML model for Web application self defense through an Aspect Oriented Approach

Dhanya Pramod, Vinay Vaidya
2009 International Journal of Computer and Electrical Engineering  
tampering and session hijacking attacks.  ...  Invention of internet has paved a way for popularity of Web based applications. Web application vulnerabilities are a major concern for critical applications.  ...  The work "A proposal and implementation of Automatic detection/collection system for Cross site scripting vulnerability" by Omar Ismail and Masahi Etoh [20] discusses the cross site scripting vulnerability  ... 
doi:10.7763/ijcee.2009.v1.69 fatcat:cuskldxdrnbctehtdzh3a6tsa4

Securing Web Application by Embedded Firewall

E. Kazanavicius, V. Kazanavicius, A. Venckauskas, R. Paskevicius
2012 Elektronika ir Elektrotechnika  
The paper proposed an embedded web application firewall model based on a "black" and "white" lists of vulnerabilities which allows flexible and efficient development of Web applications firewalls, to assess  ...  Developed and tested a prototype of a firewall, to show an advantage of embedded Web application firewall. Ill. 4, bibl. 21, tabl. 3 (in English; abstracts in English and Lithuanian). E.  ...  EWAF model can be used in developing new or improving existing security measures on any web application platform.  ... 
doi:10.5755/j01.eee.119.3.1366 fatcat:wdsigcqczjgqvn5o6ywyyin4xu

Data mining for the analysis of content interaction in web-based learning and training systems [chapter]

C. Pahl
2006 Data Mining in E-Learning  
Data mining is based on the detection and extraction of knowledge from a database. Web usage mining is a special form of data mining to address behaviour in Web sites.  ...  We will introduce and illustrate a number of mining techniques that were developed specifically for the educational context.  ...  Acknowledgements The author would like to thank the School of Computing and the Teaching and Learning Fund at Dublin City University for their support.  ... 
doi:10.2495/1-84564-152-3/03 fatcat:7a2777tusrhgzcsa4ycpkh6xzi
« Previous Showing results 1 — 15 out of 80,336 results