Segui questo link per vedere altri tipi di pubblicazioni sul tema: Mobile botnet.

Articoli di riviste sul tema "Mobile botnet"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Mobile botnet".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.

1

Wang, Yichuan, Yefei Zhang, Wenjiang Ji, Lei Zhu e Yanxiao Liu. "Gleer: A Novel Gini-Based Energy Balancing Scheme for Mobile Botnet Retopology". Wireless Communications and Mobile Computing 2018 (2018): 1–10. http://dx.doi.org/10.1155/2018/7805408.

Testo completo
Abstract (sommario):
Mobile botnet has recently evolved due to the rapid growth of smartphone technologies. Unlike legacy botnets, mobile devices are characterized by limited power capacity, calculation capabilities, and wide communication methods. As such, the logical topology structure and communication mode have to be redesigned for mobile botnets to narrow energy gap and lower the reduction speed of nodes. In this paper, we try to design a novel Gini-based energy balancing scheme (Gleer) for the atomic network, which is a fundamental component of the heterogeneous multilayer mobile botnet. Firstly, for each operation cycle, we utilize the dynamic energy threshold to categorize atomic network into two groups. Then, the Gini coefficient is introduced to estimate botnet energy gap and to regulate the probability for each node to be picked as a region C&C server. Experimental results indicate that our proposed method can effectively prolong the botnet lifetime and prevent the reduction of network size. Meanwhile, the stealthiness of botnet with Gleer scheme is analyzed from users’ perspective, and results show that the proposed scheme works well in the reduction of user’ detection awareness.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Karim, Ahmad, Victor Chang e Ahmad Firdaus. "Android Botnets". Journal of Organizational and End User Computing 32, n. 3 (luglio 2020): 50–67. http://dx.doi.org/10.4018/joeuc.2020070105.

Testo completo
Abstract (sommario):
Mobile botnets are gaining popularity with the expressive demand of smartphone technologies. Similarly, the majority of mobile botnets are built on a popular open source OS, e.g., Android. A mobile botnet is a network of interconnected smartphone devices intended to expand malicious activities, for example; spam generation, remote access, information theft, etc., on a wide scale. To avoid this growing hazard, various approaches are proposed to detect, highlight and mark mobile malware applications using either static or dynamic analysis. However, few approaches in the literature are discussing mobile botnet in particular. In this article, the authors have proposed a hybrid analysis framework combining static and dynamic analysis as a proof of concept, to highlight and confirm botnet phenomena in Android-based mobile applications. The validation results affirm that machine learning approaches can classify the hybrid analysis model with high accuracy rate (98%) than classifying static or dynamic individually.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Wu, Min-Hao, Chia-Hao Lee, Fu-Hau Hsu, Kai-Wei Chang, Tsung-Huang Huang, Ting-Cheng Chang e Li-Min Yi. "Simple and Ingenious Mobile Botnet Covert Network Based on Adjustable Unit (SIMBAIDU)". Mathematical Problems in Engineering 2021 (3 agosto 2021): 1–6. http://dx.doi.org/10.1155/2021/9920883.

Testo completo
Abstract (sommario):
Various services through smartphones or personal computers have become common nowadays. Accordingly, embedded malware is rapidly increasing. The malware is infiltrated by using short message service (SMS), wireless networks, and random calling and makes smartphones bots in botnets. Therefore, in a system without an appropriate deterrent, smartphones are infiltrated easily. In the security threats by malware, random calling has become serious nowadays. To develop the defensive system against random calling and prevent the infiltration of the malware through random calling, it is required to understand the exact process of how to make bots in the botnet. Thus, this research develops a simple and ingenious mobile botnet covert network based on adjustable ID units (SIMBAIDU) to investigate how a botnet network is established by using phone numbers. Perfect octave coding (P8 coding) turns out to be effective in infiltrating smartphones and executing commands, which is used for botnets. The results provide the basic process of P8 coding which is useful for developing defensive systems of smartphones.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Yerima, Suleiman Y., Mohammed K. Alzaylaee, Annette Shajan e Vinod P. "Deep Learning Techniques for Android Botnet Detection". Electronics 10, n. 4 (23 febbraio 2021): 519. http://dx.doi.org/10.3390/electronics10040519.

Testo completo
Abstract (sommario):
Android is increasingly being targeted by malware since it has become the most popular mobile operating system worldwide. Evasive malware families, such as Chamois, designed to turn Android devices into bots that form part of a larger botnet are becoming prevalent. This calls for more effective methods for detection of Android botnets. Recently, deep learning has gained attention as a machine learning based approach to enhance Android botnet detection. However, studies that extensively investigate the efficacy of various deep learning models for Android botnet detection are currently lacking. Hence, in this paper we present a comparative study of deep learning techniques for Android botnet detection using 6802 Android applications consisting of 1929 botnet applications from the ISCX botnet dataset. We evaluate the performance of several deep learning techniques including: CNN, DNN, LSTM, GRU, CNN-LSTM, and CNN-GRU models using 342 static features derived from the applications. In our experiments, the deep learning models achieved state-of-the-art results based on the ISCX botnet dataset and also outperformed the classical machine learning classifiers.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Li, Na, Yan Hui Du e Guang Xun Chen. "CPbot: The Construction of Mobile Botnet Using GCM". Applied Mechanics and Materials 635-637 (settembre 2014): 1526–29. http://dx.doi.org/10.4028/www.scientific.net/amm.635-637.1526.

Testo completo
Abstract (sommario):
In order to detect hacker attacks and take early countermeasures, this paper introduced a novel mobile botnet called CPbot which uses Google Cloud Messaging (GCM) to spread Trojan on Android devices. First, we presented the network model of this GCM based mobile botnet as well as its command and control (C&C) mechanism. Secondly, we illustrated the different roles that this botnet can play. Finally, we setup a simulation model to discuss the topology of this mobile botnet. The MATLAB simulation result shows that CPbot is robust against single point of failures and has good resiliency to shutdown attempts, its command dissemination is highly efficient and the bot App has very low battery consumption. This analysis indicates that mobile botnet is a leading threat to mobile network security; therefore we must deploy defense strategies against this botnet.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Sun, Fenggang, Lidong Zhai, Yuejin Du, Peng Wang e Jun Li. "Design of Mobile Botnet Based on Open Service". International Journal of Digital Crime and Forensics 8, n. 3 (luglio 2016): 1–10. http://dx.doi.org/10.4018/ijdcf.2016070101.

Testo completo
Abstract (sommario):
In recent years, botnet has become one of the most serious security threats to Internet. With the rapid development of mobile network and the popularity of smartphones, botnet began to spread to mobile platform. In order to counter mobile botnet, it is meaningful to study its constructive mechanism and reproduce it. In the past studies, researchers have designed several kinds of mobile botnet model based on various communication channels, such as SMS, Bluetooth, etc. This paper proposed a general mobile botnet model based on open service, and verified its feasibility by implementing it on Android platform. This paper also analyzed this model, and then proposed potential defense strategy in terms of its characteristic, which may provide reliable theoretical and technical support for future prevention and privacy protection.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Yusof, Muhammad, Madihah Mohd Saudi e Farida Ridzuan. "Mobile Botnet Classification by using Hybrid Analysis". International Journal of Engineering & Technology 7, n. 4.15 (7 ottobre 2018): 103. http://dx.doi.org/10.14419/ijet.v7i4.15.21429.

Testo completo
Abstract (sommario):
The popularity and adoption of Android smartphones has attracted malware authors to spread the malware to smartphone users. The malware on smartphone comes in various forms such as Trojans, viruses, worms and mobile botnet. However, mobile botnet or Android botnet are more dangerous since they pose serious threats by stealing user credential information, distributing spam and sending distributed denial of service (DDoS) attacks. Mobile botnet is defined as a collection of compromised mobile smartphones and controlled by a botmaster through a command and control (C&C) channel to serve a malicious purpose. Current research is still lacking in terms of their low detection rate due to their selected features. It is expected that a hybrid analysis could improve the detection rate. Therefore, machine learning methods and hybrid analysis which combines static and dynamic analyses were used to analyse and classify system calls, permission and API calls. The objective of this paper is to leverage machine learning techniques to classify the Android applications (apps) as botnet or benign. The experiment used malware dataset from the Drebin for the training and mobile applications from Google Play Store for testing. The results showed that Random Forest Algorithm achieved the highest accuracy rate of 97.9%. In future, more significant approach by using different feature selection such as intent, string and system component will be further explored for a better detection and accuracy rate.
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Lin, Kuan-Cheng, Sih-Yang Chen e Jason C. Hung. "Botnet Detection Using Support Vector Machines with Artificial Fish Swarm Algorithm". Journal of Applied Mathematics 2014 (2014): 1–9. http://dx.doi.org/10.1155/2014/986428.

Testo completo
Abstract (sommario):
Because of the advances in Internet technology, the applications of the Internet of Things have become a crucial topic. The number of mobile devices used globally substantially increases daily; therefore, information security concerns are increasingly vital. The botnet virus is a major threat to both personal computers and mobile devices; therefore, a method of botnet feature characterization is proposed in this study. The proposed method is a classified model in which an artificial fish swarm algorithm and a support vector machine are combined. A LAN environment with several computers which has infected by the botnet virus was simulated for testing this model; the packet data of network flow was also collected. The proposed method was used to identify the critical features that determine the pattern of botnet. The experimental results indicated that the method can be used for identifying the essential botnet features and that the performance of the proposed method was superior to that of genetic algorithms.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Bernardeschi, Cinzia, Francesco Mercaldo, Vittoria Nardone e Antonella Santone. "Exploiting Model Checking for Mobile Botnet Detection". Procedia Computer Science 159 (2019): 963–72. http://dx.doi.org/10.1016/j.procs.2019.09.263.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Jiang, Ruei Min, Jia Sian Jhang, Fu Hau Hsu, Yan Ling Hwang, Pei Wen Huang e Yung Hoh Sheu. "JokerBot – An Android-Based Botnet". Applied Mechanics and Materials 284-287 (gennaio 2013): 3454–58. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3454.

Testo completo
Abstract (sommario):
Due to the trend that mobile devices are getting more and more popular, smart phone security becomes an important issue nowadays. This paper proposes an Android-based botnet, called JokerBot, to show the possible security problems in mobile devices. This paper describes JokerBot framework. JokerBot designs its own communication mechanism to allow different bots to communicate with each other. An attacker can use JokerBot to trigger many kinds of potential attacks, such as monitoring the SMS messages and location disclosure. Moreover, after a bot is created in a compromised smartphone, it is difficult to locate the botmaster and detect whether the smartphone is infected or not. Finally, this paper proposes some defense mechanisms to protect a smartphone against JokerBot attacks.
Gli stili APA, Harvard, Vancouver, ISO e altri
11

Faghani, Mohammad R., e Uyen T. Nguyen. "Mobile botnets meet social networks: design and analysis of a new type of botnet". International Journal of Information Security 18, n. 4 (20 giugno 2018): 423–49. http://dx.doi.org/10.1007/s10207-018-0412-6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
12

Anagnostopoulos, Marios, Georgios Kambourakis e Stefanos Gritzalis. "New facets of mobile botnet: architecture and evaluation". International Journal of Information Security 15, n. 5 (31 dicembre 2015): 455–73. http://dx.doi.org/10.1007/s10207-015-0310-0.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
13

Santos, Augusto Almeida, Michele Nogueira e Jose M. F. Moura. "A Stochastic Adaptive Model to Explore Mobile Botnet Dynamics". IEEE Communications Letters 21, n. 4 (aprile 2017): 753–56. http://dx.doi.org/10.1109/lcomm.2016.2637367.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
14

Alzahrani, Abdullah J., e Ali A. Ghorbani. "SMS-Based Mobile Botnet Detection Framework Using Intelligent Agents". Journal of Cyber Security and Mobility 5, n. 2 (2017): 47–74. http://dx.doi.org/10.13052/jcsm2245-1439.523.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
15

Eslahi, Meisam, Moslem Yousefi, Maryam Var Naseri, Y. M. Yussof, N. M. Tahir e H. Hashim. "Mobile Botnet Detection Model based on Retrospective Pattern Recognition". International Journal of Security and Its Applications 10, n. 9 (30 settembre 2016): 39–44. http://dx.doi.org/10.14257/ijsia.2016.10.9.05.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
16

Choi, Byungha, e Kyungsan Cho. "Comparison of HMM and SVM schemes in detecting mobile Botnet". Journal of the Korea Society of Computer and Information 19, n. 4 (30 aprile 2014): 81–90. http://dx.doi.org/10.9708/jksci.2014.19.4.081.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
17

Yusof, Muhammad Bin, Madihah binti Mohd Saudi e Farida Ridzuan. "A Systematic Review and Analysis of Mobile Botnet Detection for GPS Exploitation". Advanced Science Letters 23, n. 5 (1 maggio 2017): 4696–700. http://dx.doi.org/10.1166/asl.2017.8955.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
18

Karim, Ahmad, Rosli Salleh e Muhammad Khurram Khan. "SMARTbot: A Behavioral Analysis Framework Augmented with Machine Learning to Identify Mobile Botnet Applications". PLOS ONE 11, n. 3 (15 marzo 2016): e0150077. http://dx.doi.org/10.1371/journal.pone.0150077.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
19

Mahboubi, Arash, Seyit Camtepe e Keyvan Ansari. "Stochastic Modeling of IoT Botnet Spread: A Short Survey on Mobile Malware Spread Modeling". IEEE Access 8 (2020): 228818–30. http://dx.doi.org/10.1109/access.2020.3044277.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
20

Kavitha, G. "Multi Attribute Real Time Traffic Inference Algorithm for Botnet Detection in Mobile Ad Hoc Network". Wireless Personal Communications 102, n. 4 (3 febbraio 2018): 3465–76. http://dx.doi.org/10.1007/s11277-018-5384-3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
21

Zhou, Renjie, Xiao Wang, Jingjing Yang, Wei Zhang e Sanyuan Zhang. "Characterizing Network Anomaly Traffic with Euclidean Distance-Based Multiscale Fuzzy Entropy". Security and Communication Networks 2021 (16 giugno 2021): 1–9. http://dx.doi.org/10.1155/2021/5560185.

Testo completo
Abstract (sommario):
The prosperity of mobile networks and social networks brings revolutionary conveniences to our daily lives. However, due to the complexity and fragility of the network environment, network attacks are becoming more and more serious. Characterization of network traffic is commonly used to model and detect network anomalies and finally to raise the cybersecurity awareness capability of network administrators. As a tool to characterize system running status, entropy-based time-series complexity measurement methods such as Multiscale Entropy (MSE), Composite Multiscale Entropy (CMSE), and Fuzzy Approximate Entropy (FuzzyEn) have been widely used in anomaly detection. However, the existing methods calculate the distance between vectors solely using the two most different elements of the two vectors. Furthermore, the similarity of vectors is calculated using the Heaviside function, which has a problem of bouncing between 0 and 1. The Euclidean Distance-Based Multiscale Fuzzy Entropy (EDM-Fuzzy) algorithm was proposed to avoid the two disadvantages and to measure entropy values of system signals more precisely, accurately, and stably. In this paper, the EDM-Fuzzy is applied to analyze the characteristics of abnormal network traffic such as botnet network traffic and Distributed Denial of Service (DDoS) attack traffic. The experimental analysis shows that the EDM-Fuzzy entropy technology is able to characterize the differences between normal traffic and abnormal traffic. The EDM-Fuzzy entropy characteristics of ARP traffic discovered in this paper can be used to detect various types of network traffic anomalies including botnet and DDoS attacks.
Gli stili APA, Harvard, Vancouver, ISO e altri
22

Farina, Paolo, Enrico Cambiaso, Gianluca Papaleo e Maurizio Aiello. "Mobile Botnets Development: Issues and Solutions". International Journal of Future Computer and Communication 3, n. 6 (dicembre 2014): 385–90. http://dx.doi.org/10.7763/ijfcc.2014.v3.333.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
23

Wang, Yichuan, Han Yu, Xinhong Hei, Binbin Bai e Wenjiang Ji. "From Unknown to Similar: Unknown Protocol Syntax Analysis for Network Flows in IoT". Security and Communication Networks 2021 (2 agosto 2021): 1–13. http://dx.doi.org/10.1155/2021/9179286.

Testo completo
Abstract (sommario):
Internet of Things (IoT) is the development and extension of computer, Internet, and mobile communication network and other related technologies, and in the new era of development, it increasingly shows its important role. To play the role of the Internet of Things, it is especially important to strengthen the network communication information security system construction, which is an important foundation for the Internet of Things business relying on Internet technology. Therefore, the communication protocol between IoT devices is a point that cannot be ignored, especially in recent years; the emergence of a large number of botnet and malicious communication has seriously threatened the communication security between connected devices. Therefore, it is necessary to identify these unknown protocols by reverse analysis. Although the development of protocol analysis technology has been quite mature, it is impossible to identify and analyze the unknown protocols of pure bitstreams with zero a priori knowledge using existing protocol analysis tools. In this paper, we make improvements to the existing protocol analysis algorithm, summarize and learn from the experience and knowledge of our predecessors, improve the algorithm ideas based on the Apriori algorithm idea, and perform feature string finding under the idea of composite features of CFI (Combined Frequent Items) algorithm. The advantages of existing algorithm ideas are combined together to finally propose a more efficient OFS (Optimal Feature Strings) algorithm with better performance in the face of bitstream protocol feature extraction problems.
Gli stili APA, Harvard, Vancouver, ISO e altri
24

Mtibaa, Abderrahmen. "MobiBots: Towards detecting distributed mobile botnets". Qatar Foundation Annual Research Forum Proceedings, n. 2013 (novembre 2013): ICTO 05. http://dx.doi.org/10.5339/qfarf.2013.icto-05.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
25

Apvrille, Axelle. "Symbian worm Yxes: towards mobile botnets?" Journal in Computer Virology 8, n. 4 (1 maggio 2012): 117–31. http://dx.doi.org/10.1007/s11416-012-0163-2.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
26

Campbell, MacGregor. "Mobile botnets show their disruptive potential". New Scientist 204, n. 2734 (novembre 2009): 26. http://dx.doi.org/10.1016/s0262-4079(09)62990-0.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
27

Mtibaa, Abderrahmen, Khaled A. Harras e Hussein Alnuweiri. "From botnets to MobiBots: a novel malicious communication paradigm for mobile botnets". IEEE Communications Magazine 53, n. 8 (agosto 2015): 61–67. http://dx.doi.org/10.1109/mcom.2015.7180509.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
28

Liao, Qi, e Zhen Li. "Portfolio optimization of computer and mobile botnets". International Journal of Information Security 13, n. 1 (18 agosto 2013): 1–14. http://dx.doi.org/10.1007/s10207-013-0206-9.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
29

Chen, Wei, Xiapu Luo, Chengyu Yin, Bin Xiao, Man Ho Au e Yajuan Tang. "CloudBot: Advanced mobile botnets using ubiquitous cloud technologies". Pervasive and Mobile Computing 41 (ottobre 2017): 270–85. http://dx.doi.org/10.1016/j.pmcj.2017.03.007.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
30

Costa, Victor G. Turrisi Da, Sylvio Barbon Junior, Rodrigo S. Miani, Joel J. P. C. Rodrigues, Bruno Bogaz Zarpel�ã e N. A. o. "Mobile botnets detection based on machine learning over system calls". International Journal of Security and Networks 14, n. 2 (2019): 103. http://dx.doi.org/10.1504/ijsn.2019.100092.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
31

Zarpel�ão, Bruno Bogaz, Victor G. Turrisi Da Costa, Sylvio Barbon Junior, Rodrigo S. Miani e Joel J. P. C. Rodrigues. "Mobile botnets detection based on machine learning over system calls". International Journal of Security and Networks 14, n. 2 (2019): 103. http://dx.doi.org/10.1504/ijsn.2019.10021704.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
32

Mitrea, Teodor, e Monica Borda. "Mobile Security Threats: A Survey on Protection and Mitigation Strategies". International conference KNOWLEDGE-BASED ORGANIZATION 26, n. 3 (1 giugno 2020): 131–35. http://dx.doi.org/10.2478/kbo-2020-0127.

Testo completo
Abstract (sommario):
AbstractThe spectacular growth in the use of mobile devices is a natural consequence of the benefits they offer. However, most mobile users grant little importance to the security of information stored, processed and transmitted. Even more, the last two years can be considered years of reference for the mobile security industry - ranging from virulent mobile ransomware attacks to mobile IoT botnets and mobile security breaches through mobile malware, that have redefined security paradigms. It is clear that we are at a point of inflection and transition to another generation of cyber attacks and the tendency is that attacks on mobile devices will expand. The security of mobile devices is a topical issue and the main objective is to educate the user to know the risks to which he/she is exposed to and to offer him/her viable security solutions in order to protect himself/herself against mobile threats. In this article we are going to present some protection and mitigation strategies with recommendations for improvement.
Gli stili APA, Harvard, Vancouver, ISO e altri
33

Lu, Zhuo, Wenye Wang e Cliff Wang. "On the Evolution and Impact of Mobile Botnets in Wireless Networks". IEEE Transactions on Mobile Computing 15, n. 9 (1 settembre 2016): 2304–16. http://dx.doi.org/10.1109/tmc.2015.2492545.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
34

Chen, Wei, Peihua Gong, Le Yu e Geng Yang. "An adaptive push-styled command and control mechanism in mobile botnets". Wuhan University Journal of Natural Sciences 18, n. 5 (ottobre 2013): 427–34. http://dx.doi.org/10.1007/s11859-013-0952-6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
35

Farina, Paolo, Enrico Cambiaso, Gianluca Papaleo e Maurizio Aiello. "Are mobile botnets a possible threat? The case of SlowBot Net". Computers & Security 58 (maggio 2016): 268–83. http://dx.doi.org/10.1016/j.cose.2016.02.005.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
36

Perez, Manuel Gil, Alberto Huertas Celdran, Fabrizio Ippoliti, Pietro G. Giardina, Giacomo Bernini, Ricardo Marco Alaez, Enrique Chirivella-Perez et al. "Dynamic Reconfiguration in 5G Mobile Networks to Proactively Detect and Mitigate Botnets". IEEE Internet Computing 21, n. 5 (2017): 28–36. http://dx.doi.org/10.1109/mic.2017.3481345.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
37

Hu, Jinlong, Tenghui Li, Yi Zhuang, Song Huang e Shoubin Dong. "GFD: A Weighted Heterogeneous Graph Embedding Based Approach for Fraud Detection in Mobile Advertising". Security and Communication Networks 2020 (4 settembre 2020): 1–12. http://dx.doi.org/10.1155/2020/8810817.

Testo completo
Abstract (sommario):
Online mobile advertising plays a vital role in the mobile app ecosystem. The mobile advertising frauds caused by fraudulent clicks or other actions on advertisements are considered one of the most critical issues in mobile advertising systems. To combat the evolving mobile advertising frauds, machine learning methods have been successfully applied to identify advertising frauds in tabular data, distinguishing suspicious advertising fraud operation from normal one. However, such approaches may suffer from labor-intensive feature engineering and robustness of the detection algorithms, since the online advertising big data and complex fraudulent advertising actions generated by malicious codes, botnets, and click-firms are constantly changing. In this paper, we propose a novel weighted heterogeneous graph embedding and deep learning-based fraud detection approach, namely, GFD, to identify fraudulent apps for mobile advertising. In the proposed GFD approach, (i) we construct a weighted heterogeneous graph to represent behavior patterns between users, mobile apps, and mobile ads and design a weighted metapath to vector algorithm to learn node representations (graph-based features) from the graph; (ii) we use a time window based statistical analysis method to extract intrinsic features (attribute-based features) from the tabular sample data; (iii) we propose a hybrid neural network to fuse graph-based features and attribute-based features for classifying the fraudulent apps from normal apps. The GFD approach was applied on a large real-world mobile advertising dataset, and experiment results demonstrate that the approach significantly outperforms well-known learning methods.
Gli stili APA, Harvard, Vancouver, ISO e altri
38

Zuzcák, Matej, e Petr Bujok. "Using honeynet data and a time series to predict the number of cyber attacks". Computer Science and Information Systems, n. 00 (2021): 40. http://dx.doi.org/10.2298/csis200715040z.

Testo completo
Abstract (sommario):
A large number of cyber attacks are commonly conducted against home computers, mobile devices, as well as servers providing various services. One such prominently attacked service, or a protocol in this case, is the Secure Shell (SSH) used to gain remote access to manage systems. Besides hu man attackers, botnets are a major source of attacks on SSH servers. Tools such as honeypots allow an effective means of recording and analysing such attacks. However, is it also possible to use them to effectively predict these attacks? The prediction of SSH attacks, specifically the prediction of activity on certain subjects, such as autonomous systems, will be beneficial to system administrators, internet service providers, and CSIRT teams. This article presents multiple methods for using a time series, based on real-world data, to predict these attacks. It focuses on the overall prediction of attacks on the honeynet and the prediction of attacks from specific geographical regions. Multiple approaches are used, such as ARIMA, SARIMA, GARCH, and Bootstrapping. The article presents the viability, precision and usefulness of the individual approaches for various areas of IT security.
Gli stili APA, Harvard, Vancouver, ISO e altri
39

Solomon, Zakkam, Meghana K M, Manjula e Roshini B. "SURVEY ON E-FINGERPRINT TICKET". International Journal of Research -GRANTHAALAYAH 5, n. 4RACSIT (30 aprile 2017): 53–57. http://dx.doi.org/10.29121/granthaalayah.v5.i4racsit.2017.3351.

Testo completo
Abstract (sommario):
Earlier work has demonstrated that when going in a transport the installment accomplished for ticket is with money .The transport ticket has such an installment figure which makes the voyager or the conductor shy of cash as far as change. This makes the conductor to keep the change with himself .This makes bother to the explorers. Subsequently there is a requirement for better workplace. To conquer this issue we are making utilization of fingerprints of the voyager which are connected to the database. The enrollment procedure will take every one of the points of interest of the client when going surprisingly. The record is made with some e-cash in it .While venturing out client needs to give his unique mark and pay the cash for ticket through his record naturally .This beats the client bother. What's more, Security is the fundamental calculate all associations and has more significance in transport. Security can be given by any mean can't give greater adaptability, the current E-Ticket framework does not contain adequate security, so we think to execute biometrics in our examination and after that we moved to another imaginative innovation to utilize unique mark module likewise for the extra for client adaptability utilizing Global System for Mobile Communication module for Communication reason for sending and accepting message. By this Survey, we can limit Fraud in transport and give greater office to voyager and enhances security for the general public.
Gli stili APA, Harvard, Vancouver, ISO e altri
40

Sowmya, K. V., A. Chandu, A. Nagasai, C. H. Sri Harsha Preetham e K. Supreeth. "Smart Home System Using Clustering Based on Internet of Things". Journal of Computational and Theoretical Nanoscience 17, n. 5 (1 maggio 2020): 2369–74. http://dx.doi.org/10.1166/jctn.2020.8897.

Testo completo
Abstract (sommario):
Now a days we all are busy in our regular works, holding the burden of works on our shoulder so, with the help of smart home appliances we can get some secure and an easy way to control the home appliances and we can also know the location information of that particular device. These days lot of researchers are focusing their interest on IoT (Internet of Things). The most vital application where IoT is being mostly used is home automation where all the electronic gadgets are connected to the internet via various layers viz, device level, controller level, restful services level, gateway level and finally the cloud layer. Moreover, gigantic information is being produced by the IoT devices. This information has to be processed and stored in a very effective manner so as to control the home appliances from anywhere in the world. Here we control the home appliances through our mobile by the use of IoT. So, we can control our home appliances very easy and fast compared to the manual operation such as on and off of any device. There might be some relief in our daily life that not to bother about whether we switch off the home appliances or not, instead of it we can check the mobile and solve the situations in short period of time.
Gli stili APA, Harvard, Vancouver, ISO e altri
41

Chen, Jun, Huan Wu, Xi Zhou, Maoguo Wu, Chenyang Zhao e Shiyan Xu. "Optimization of Internet of Things E-Commerce Logistics Cloud Service Platform Based on Mobile Communication". Complexity 2021 (20 marzo 2021): 1–11. http://dx.doi.org/10.1155/2021/5542914.

Testo completo
Abstract (sommario):
E-commerce conceivable future trade, consumption, and service is a new digital employer mode. Therefore, in order to decorate the customary natural environment of operation, it is quintessential to get rid of the preferred desktop in the true field, create a social logistics and transportation administration computing device with commodity agents and distributors as the key features, and mix freight logistics, business enterprise approach waft and data waft advertising and marketing, and advertising and marketing organically. The notion of e-commerce logistics looks alongside the enchantment vogue of neighborhood technological knowledge and social demand. It is an integral part of ending e-commerce authentic economic value. All kinds of cell networks clear up the problem of data flow communication; in the technological know-how of telephone network, digital cost solves the bother of capital flow; at present, logistics is however a long-standing problem of e-commerce. Logistics has grown to be the last and entirely bottleneck of e-commerce. If logistics cannot adapt to the enchantment of e-commerce, it may also additionally lead to the slow enchantment of e-commerce. The purpose of this paper is to supply an Internet of things (IoT) e-commerce logistics cloud provider platform based totally absolutely on cell communication, which can be combined with e-commerce and beautify the transport tempo of e-commerce. This paper moreover optimizes the e-commerce logistics system, so that it can combine with e-commerce to increase out the distribution of goods, the distribution tempo of e-commerce is doubled, and e-commerce can in a similar fashion develop rapidly.
Gli stili APA, Harvard, Vancouver, ISO e altri
42

Santos, Ronaldo Antonio dos, Marcos Vinícius Folegatti, Tarlei Arriel Botrel, Roberto Terumi Atarassi e José Alves Júnior. "PROJETO, CONSTRUÇÃO E CALIBRAÇÃO DE UM LISÍMETRO MÓVEL DE PESAGEM, COM CÉLULA DE CARGA HIDRÁULICA, PARA DETERMINAÇÃO DA DEMANDA HÍDRICA DE MUDAS CÍTRICAS EM CASA DE VEGETAÇÃO". IRRIGA 12, n. 2 (10 agosto 2007): 202–15. http://dx.doi.org/10.15809/irriga.2007v12n2p202-215.

Testo completo
Abstract (sommario):
PROJETO, CONSTRUÇÃO E CALIBRAÇÃO DE UM LISÍMETRO MÓVEL DE PESAGEM, COM CÉLULA DE CARGA HIDRÁULICA, PARA DETERMINAÇÃO DA DEMANDA HÍDRICA DE MUDAS CÍTRICAS EM CASA DE VEGETAÇÃO Ronaldo Antonio dos Santos; Marcos Vinícius Folegatti; Tarlei Arriel Botrel; Roberto Terumi Atarassi; José Alves JúniorDepartamento de Engenharia Rural, Escola Superior de Agricultura "Luiz de Queiroz", Universidade de São Paulo, Piracicaba, SP, santosra@esalq.usp.br 1 RESUMO Este trabalho teve como objetivo desenvolver, construir e analisar a performance de um lisímetro móvel de pesagem, utilizando célula de carga hidráulica confeccionada com diafragma. A solução encontrada para viabilizar a lisimetria no atual sistema de produção de mudas cítricas em casa de vegetação, com grupos de plantas muito heterogêneos, foi o emprego de uma estrutura móvel, capaz de pesar, isoladamente, vários contentores de mudas. O número de contentores seria função do número de variedades e estádio de desenvolvimento, enquanto que o número de estruturas de pesagem seria função do número de contentores. Os resultados obtidos permitiram concluir que o lisímetro apresentou um bom desempenho, resultando na equação de calibração V=0,018.LR, onde V é o volume de água (L.planta-1) e LR é a leitura piezométrica (mm). Esta equação apresentou um r2 de 0,997, indicando a excelente precisão do equipamento. Com um r2 de 0,997, originado da regressão entre o volume estimado e volume real, e um índice de Concordância (d) de 0,9993, o lisímetro apresentou excelente acurácia, com resolução de 0,45mm de lâmina de água. Sua mobilidade permitiu o livre deslocamento entre bancadas de mudas, exigindo um único operador. O custo total de construção do equipamento foi de US$1.108,54. UNITERMOS: lisimetria móvel, evapotranspiração, citros SANTOS, R. A. dos; FOLEGATTI, M. V.; BOTREL, T. A.; ATARASSI, R. T.; ALVES JÚNIOR, J. DESIGN, CONSTRUCTION AND EVALUATION OF A WEIGHING LYSIMETER WITH HYDRAULIC LOAD CELL TO DETERMINE WATER REQUIREMENTS OF CITRUS NURSERY TREES IN GREENHOUSE 2 ABSTRACT The aim of the present work was to develop, build and evaluate the performance of a mobile weighing lysimeter using a hydraulic load cell with a diaphragm. In order to make the use of lysimeter feasible in the present citrus nursery production system in greenhouses with very heterogeneous group of plants, a mobile structure capable of weighing several containers of seedlings separately was used. The quantity of containers was the function of the number of varieties and their development stages and the number of weighing structure, a function of the number of containers. From the obtained results, it was concluded that the lysimeter presented a good performance, providing the calibration equation V=0.018LR, where V is the water volume (L.plant‾¹) and LR is the piezometric reading (mm). The determination coefficient (r²) was 0.997, indication an excellent equipment adjustment. A regression between estimated and actual volumes provided an r² of 0.998 and a concordance index (d) of 0.0003, indicating an excellent accuracy with 0.45mm depth resolution. The equipment mobility allowed free movement in nursery benches and just one operator was required. Total equipment assembly cost was about US$ 1,108.54. KEYWORDS: mobile lysimeter, evapotranspiration, Citrus.
Gli stili APA, Harvard, Vancouver, ISO e altri
43

Dekker, Travis J., Kamran S. Hamid, Andrew E. Federer, John R. Steele, Mark E. Easley, James A. Nunley e Samuel B. Adams. "The Value of Motion: Patient-Reported Outcome Measures Are Correlated With Range of Motion in Total Ankle Replacement". Foot & Ankle Specialist 11, n. 5 (25 dicembre 2017): 451–56. http://dx.doi.org/10.1177/1938640017750258.

Testo completo
Abstract (sommario):
Background: The proposed benefit of total ankle replacement (TAR) over ankle fusion is preserved ankle motion, thus we hypothesized that an increase in range of motion (ROM) is positively correlated with validated patient-reported outcome measures (PROMs) in individuals receiving TAR. Methods: Patients undergoing TAR at a single academic medical center between 2007 and 2013 were evaluated in this study. In addition to a minimum of 2-year follow-up, complete preoperative and postoperative outcome measures for the Foot and Ankle Disability Index (FADI), Short Musculoskeletal Function Assessment (SMFA) Bother and Function Indices, Visual Analog Scale (VAS), and 36-Item Short Form Health Survey (SF-36) were requisite for inclusion. Standardized weightbearing maximum dorsiflexion and plantarflexion sagittal radiographs were obtained and previously described ankle and foot measurements were performed to determine ankle ROM. Results: Eighty-eight patients met inclusion criteria (33 INBONE, 18 Salto-Talaris, 37 STAR). Mean time to final ROM radiographs was 43.8 months (range 24-89 months). All aforementioned PROMs improved between preoperative evaluation and most recent follow-up ( P < .01). Final ankle ROM was significantly correlated with postoperative FADI, SF-36 Mental Component Summary (MCS), SMFA Bother and Function Indices, and VAS. Additionally, dorsiflexion was positively associated with FADI, SF-36 MCS, and SMFA Function ( P < .05) but plantarflexion had no such influence on outcomes. No differences were identified with subset stratification by prosthesis type, fixed versus mobile-bearing design or etiology. Conclusion: In this TAR cohort with prospectively collected outcomes data, radiographic sagittal plane ankle motion was positively correlated with multiple PROMs. Disease-specific and generic health-related quality of life PROMs demonstrated improvement postoperatively in all domains when evaluating final total range of motion. Patients who undergo TAR for end-stage osteoarthritis with improvement in ROM demonstrate a direct correlation with improved patient-centric metrics and outcome scores. Levels of Evidence: Level III: Retrospective comparative study
Gli stili APA, Harvard, Vancouver, ISO e altri
44

Hamid, Kamran, Travis Dekker, Mark Easley, James Nunley e Samuel Adams. "The Value of Motion". Foot & Ankle Orthopaedics 2, n. 3 (1 settembre 2017): 2473011417S0000. http://dx.doi.org/10.1177/2473011417s000046.

Testo completo
Abstract (sommario):
Category: Ankle, Ankle Arthritis Introduction/Purpose: The onus has been placed on surgeons to prove the value of procedures to patients, payers, policymakers and other key stakeholders. Demonstration of patient reported outcome measures (PROMs) constitutes an integral component of success within the context of value-based healthcare. The proposed benefit of total ankle replacement (TAR) over ankle fusion is preserved ankle motion, thus we hypothesized that an increase in range of motion (ROM) is positively correlated with validated PROMs in individuals receiving TAR. Methods: Patients undergoing TAR at a single academic medical center between 2007-2013 were evaluated in this study. In addition to a minimum of two-year follow-up, complete preoperative and postoperative outcome measures for the Foot and Ankle Disability Index (FADI), Short Musculoskeletal Function Assessment (SMFA) Bother and Function Indices, Visual Analog Scale (VAS) and 36-Item Short Form Health Survey (SF-36) were requisite for inclusion. Standardized weightbearing maximum dorsiflexion and plantarflexion sagittal radiographs were obtained and previously described ankle and foot measurements were performed to determine ankle ROM. Results: Eighty-eight patients met inclusion criteria (33 INBONE, 18 Salto-Talaris, 37 STAR). Mean time to final ROM radiographs was 43.8 months (range: 24-89 months). All aforementioned PROMs improved between preoperative evaluation and most recent follow-up (p<0.01). Final ankle ROM was significantly correlated with postoperative FADI, SF-36 Mental Component Summary (MCS), SMFA Bother and Function Indices, and VAS. Additionally, dorsiflexion was positively associated with FADI, SF-36 MCS and SMFA Function (p<0.05) but plantarflexion had no such influence on outcomes. No differences were identified with subset stratification by prosthesis type, fixed versus mobile-bearing design or etiology. Conclusion: In this TAR cohort with prospectively collected outcomes data, radiographic sagittal plane ankle motion was positively correlated with multiple PROMs. Disease-specific and generic health-related quality of life PROMs demonstrated improvement postoperatively in all domains. TAR is a viable option for patients with end-stage ankle arthritis and increased ROM is associated with improved patient-centric metrics.
Gli stili APA, Harvard, Vancouver, ISO e altri
45

Aripin, Norizah, e Ummi Madihah Daud. "SIKAP PENGGUNAAN RADIO ATAS TALIAN “THR GEGAR” DALAM KALANGAN MAHASISWA UNIVERSITI". Asian People Journal (APJ) 3, SI1 (30 dicembre 2020): 19–32. http://dx.doi.org/10.37231/apj.2020.3.si1.234.

Testo completo
Abstract (sommario):
The age of modern technology has created the online radio "THR Gegar" which is an alternative radio channel to fans of the radio channel by using the Internet and mobile gadgets in its broadcasting without having to bother finding the right frequency to get its broadcast wave. This study aims to examine the factors that influence the attitude of online radio use "THR Gegar" among students of Universiti Utara Malaysia. This study uses a quantitative methodology that is a survey of questionnaires. Distribution of questionnaires was given to students of Universiti Utara Malaysia, especially INASIS Petronas. This study uses descriptive statistical analysis, Pearson and Spearman correlation analysis and t-test to analyze the entire collected data. The results of the study found that there is a positive relationship between knowledge, ease of use, usefulness, enjoyment and frequency of use of online radio "THR Gegar" on the attitude of online radio use "THR Gegar". While, there is no difference between the gender and the attitude of using the radio. Based on the results of this study, the factors that influence the attitude of online radio use "THR Gegar" are knowledge, easy to use, useful, enjoyment and frequency of use of online radio "THR Gegar". The results of this study are significant in terms of the development of theory, methodology and field of digital radio broadcasting. Keywords: Attitude, Technology Acceptance Model, "THR Gegar" Online Radio
Gli stili APA, Harvard, Vancouver, ISO e altri
46

Anggoro, Muhammad Agung, e Mas Intan Purba. "THE IMPACT OF ATTRACTIVENESS OF ADS AND CUSTOMER COMMENTS AGAINST TO PURCHASE DECISION OF CUSTOMER PRODUCTS ON THE USER OF ONLINE SHOP APPLICATIONS IN THE CITY OF MEDAN". Jurnal Ilmiah Bina Manajemen 3, n. 1 (13 marzo 2020): 1–9. http://dx.doi.org/10.33557/jibm.v3i1.823.

Testo completo
Abstract (sommario):
The increasingly fierce competition of online shop products spurred online shop application providers to undertake business development strategy steps by strengthening digital business services and various service innovations to meet customer needs. This can be seen from the public interest in shopping at online stores because prices are more competitive, there is no need to bother coming directly to the store, and the goods purchased will be delivered to the buyers’ place. The population in this study that used mobile shop online application services was 105,551 respondents with the formula Slovin obtained a sample size of 100 respondents. The research data analysis method is quantitative descriptive statistical analysis and multiple regression analysis. The result of this research is that the attractiveness of advertisements and customer comments together have a positive and significant effect in increasing customer product purchasing decisions for users of online shop applications in Medan, while partially the attractiveness of advertising (X1) only has a positive and significant effect, but the variables customer comments (X2) have no positive effect in improving customer product purchasing decisions on users of online shop applications in the city of Medan. Persaingan produk online shop yang semakin ketat memacu perusahaan penyedia aplikasi online shop untuk melakukan langkah strategi pengembangan usaha dengan perkuatan layanan bisnis digital serta beragam inovasi layanan untuk memenuhi kebutuhan pelanggan. Hal tersebut terlihat dari ketertarikan masyarakat berbelanja di toko online dikarenakan harga yang lebih kompetitif, tidak perlu ribet datang langsung ke toko, dan barang yang dibeli akan diantar ke tempat pembeli. Populasi dalam penelitian ini yang menggunakan layanan mobile aplikasi online shop sebanyak 105.551 responden dengan rumus slovin diperoleh jumlah sampel sebanyak 100 responden. Metode analisis data penelitian adalah analisis statistik deskriptif kuantitatif dan analisis regresi berganda. Hasil penelitian diperoleh daya tarik iklan dan komentar pelanggan secara bersama-sama berpengaruh positif dan signifikan dalam meningkatkan keputusan pembelian produk pelanggan pada pengguna aplikasi online shop di Kota Medan, sedangkan secara parsial variabel daya tarik iklan (X1) saja yang berpengaruh positif dan signifikan tetapi variabel komentar pelanggan (X2) tidak berpengaruh positif dalam meningkatkan keputusan pembelian produk pelanggan pada pengguna aplikasi online shop di Kota Medan.
Gli stili APA, Harvard, Vancouver, ISO e altri
47

Beaugrand, Claire. "The Absurd Injunction to Not Belong and the Bidūn in Kuwait". International Journal of Middle East Studies 52, n. 4 (novembre 2020): 726–32. http://dx.doi.org/10.1017/s0020743820001014.

Testo completo
Abstract (sommario):
In a tweet posted on 29 March 2018, a bidūn activist—who was later jailed from July 2019 to January 2020 for peacefully protesting against the inhumane conditions under which the bidūn are living—shared a video. The brief video zooms in closely on an ID card, recognizable as one of those issued to the bidūn, or long-term residents of Kuwait who are in contention with the state regarding their legal status. More precisely, the mobile phone camera focuses on the back of the ID card, on one line with a special mention added by the Central System (al-jihāz al-markazī), the administration in charge of bidūn affairs. Other magnetic strip cards hide the personal data written above and below it. A male voice can be heard saying that he will read this additional remark, but before even doing so he bursts into laughter. The faceless voice goes on to read out the label in an unrestrained laugh: “ladayh qarīb … ladayh qarīna … dālla ʿalā al-jinsiyya al-ʿIrāqiyya” (he has a relative … who has presumptive evidence … suggesting an Iraqi nationality). The video shakes as the result of a contagious laugh that grows in intensity. In the Kuwaiti dialect, the voice continues commenting: “Uqsim bil-Allāh, gaʿadt sāʿa ufakkir shinū maʿanāt hal-ḥatchī” (I swear by God, it took me an hour to figure out the meaning of this nonsense), before reading the sentence again, stopping and guffawing, and asking if he should “repeat it a third time,” expressing amazement at its absurdity. The tweet, addressed to the head of the Central System (mentioned in the hashtag #faḍīḥat Sāliḥ al-Faḍāla, or #scandal Salih al-Fadala), reads: In lam tastaḥī fa-'ktub mā shaʾt (Don't bother, write what you want).
Gli stili APA, Harvard, Vancouver, ISO e altri
48

Gil Zapirain, Oier. "Simulación de la protesta sociopolítica". AUSART 4, n. 1 (12 luglio 2016): 175–85. http://dx.doi.org/10.1387/ausart.16698.

Testo completo
Abstract (sommario):
Este artículo plantea un análisis de Protest-$1 como proyecto artístico-tecnológico multiusuario, interactivo y relacional que permite al usuario un acercamiento cognitivo a la protesta sociopolítica, siendo parte de una manifestación simulada en contra de los bombardeos de Israel sobre Palestina. La instalación se compone de una proyección frontal, dos altavoces y tres dispositivos compuestos de un megáfono y un smartphone, cada uno. El interactor elige las acciones que desea hacer acontecer en el evento de protesta pulsando los botones de la pantalla táctil del teléfono móvil y posteriormente, agita el megáfono con el fin de materializar en la manifestación, mediante el esfuerzo, la acción escogida. A su vez, Protesta-$1 permite a los usuarios luchar para evitar que otro usuario consiga sacar adelante la acción de protesta elegida creando un marco en el que el querer de la mayoría somete siempre a la minoría. Los altavoces emiten la voz de los medios de comunicación que relatan la protesta en forma de noticiario y a tiempo real, permitiendo a los interactores articular la protesta siendo conscientes de la imagen global que se está emitiendo.Palabras clave: INTERACCIÓN MULTIUSUARIO; ARTICULACIÓN; PROTESTA SOCIOPOLÍTICA; MEDIOS DE COMUNICACIÓN; CONECTIVIDAD Simulating socio-political protestAbstractThis paper presents an analysis of Protest-$1: an artistic-technological, multi-user, interactive, relational project that provides the user with a cognitive approach to the socio-political protest by being part of a simulated demonstration against the Israeli bombing of Palestine. The installation comprises a front projection screen, two loudspeakers and three devices each consisting of a megaphone and a smartphone. The person who is interacting selects the actions that he/she wants to make happen during the protest event by pressing the buttons on the touch screen of a mobile phone and then shaking a megaphone so that, through this effort, the chosen action can be implemented in the demonstration. Likewise, by creating a framework in which the wishes of the majority always prevail over those of the minority, Protest-$1 allows the users to fight and thus prevent another user from managing to implement their own chosen protest action. The loudspeakers broadcast the voice of the mass media reporting on the protest in the form of a news bulletin and in real time, thus allowing those interacting to articulate the protest while remaining aware of the global image that is being broadcast.Keywords: INTERACTION; MULTI-USER; ARTICULATION; SOCIO-POLITICAL PROTEST; MASS MEDIA; CONNECTIVITY
Gli stili APA, Harvard, Vancouver, ISO e altri
49

Paulino, Rita De Cássia Romeiro, e Marina Lisboa Empinotti. "PRODUTOS JORNALÍSTICOS PARA TABLETS COMO FERRAMENTAS PEDAGÓGICAS: estudo de caso do Golpe de 1964". Revista Observatório 3, n. 6 (1 ottobre 2017): 636. http://dx.doi.org/10.20873/uft.2447-4266.2017v3n6p636.

Testo completo
Abstract (sommario):
Este trabalho detalha o processo produtivo de um produto jornalístico para tablets-iPad no formato Folio voltado para a Educação. A concepção envolve apuração, checagem de informações, redação, editoração e demais etapas do trabalho do Jornalista, mas pensado para ser aplicado de forma didática em sala de aula, para um público-alvo de ensino fundamental, de 12 a 14 anos. A partir do software Adobe Indesign e as ferramentas gratuitas Adobe para publicação e distribuição de documentos na nuvem, cria-se um modo simples, rápido, barato e de fácil atualização para professores trabalharem com os estudantes em salas de aula de qualquer lugar com acesso à internet. O formato Folio permite adicionar um visual atrativo e possibilidades de interação como jogos, botões de navegação, vídeos, galerias de imagens e áudios para despertar a curiosidade diante de assuntos que devem ser trabalhados como parte do currículo escolar, mas não precisam estar limitados ao espaço do livro didático. PALAVRAS-CHAVE: Jornalismo digital; tablet; dispositivos móveis; educomunicação. ABSTRACT This paper details the production process of a journalistic product for tablet-iPad Folio format in facing education. The design involves counting, checking information, writing, publishing and other stages of the work of the journalist, but thought to be applied in a didactic way in the classroom for an elementary school audience of 12 to 14 years. From Adobe Indesign software and free Adobe tools for publication and distribution of documents in the cloud, you create a simple, fast, cheap and easy to update for teachers working with students in classrooms from anywhere with internet access. The Folio format allows you to add a visual attraction and possibilities of interaction as games, navigation buttons, videos, galleries of images and audios to arouse curiosity on matters that should be worked out as part of the school curriculum, but need not be limited to the space of the textbook. KEYWORDS: Digital journalism; Tablet; mobile devices; Educommunication. RESUMEN Este trabajo detalla el proceso de fabricación de un producto periodístico para tabletas iPad Folio formato centrado en la educación. El diseño implica la verificación, comprobación de información, escritura, publicación y otras etapas de la obra de la periodista, pero pensado para ser aplicado en el aula de enseñanza, a un público objetivo de la escuela primaria, de 12 a 14 años. Adobe Indesign software y herramientas gratuitas de Adobe para la publicación y distribución de documentos en la nube, se crea un simple, rápido, barato y fácil de actualización para profesores que trabajan con estudiantes en las clases desde cualquier lugar con acceso a internet. El formato de Folio le permite añadir un atractivo visual y posibilidades de interacción como botones de navegación, videos, juegos, galerías de imágenes y audios para despertar la curiosidad en asuntos que deben elaborarse como parte del currículum escolar, pero no necesita ser limitado al espacio del libro de texto. PALABRAS CLAVE: Periodismo digital; Tableta; dispositivos móviles; EduComunicación.
Gli stili APA, Harvard, Vancouver, ISO e altri
50

"XSS MBot: Mobile Botnet for Stealthy DDoS Attacks". International Journal of Innovative Technology and Exploring Engineering 8, n. 9 (10 luglio 2019): 2832–36. http://dx.doi.org/10.35940/ijitee.i8669.078919.

Testo completo
Abstract (sommario):
Mobile devices are overgrowing; nowadays people are using mobile devices for different activities. Over the years malware attacks on mobile devices are increasing, the primary intention of the attacker is to steal sensitive information and turn the infected mobile device into a member of the botnet. We studied differences between traditional botnets and mobile botnets, also analyzed different mobile botnet attacks. Mobile malware applications spread through Cross-site Scripting vulnerabilities in trusted websites. Developed a mobile malware which can perform Denial-of-service attacks and used this malware to test and review mobile botnet attacks. We also studied solutions to prevent these mobile botnet attacks.
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!

Vai alla bibliografia