2020 ◽  
Vol 10 (7) ◽  
pp. 2363
Author(s):  
Justinas Rastenis ◽  
Simona Ramanauskaitė ◽  
Justinas Janulevičius ◽  
Antanas Čenys ◽  
Asta Slotkienė ◽  
...  

The amount of fraud on the Internet is increasing along with the availability and the popularity of the Internet around the world. One of the most common forms of Internet fraud is phishing. Phishing attacks seek to obtain a user’s personal or secret information. The variety of phishing attacks is very broad, and usage of novel, more sophisticated methods complicates its automated filtering. Therefore, it is important to form up-to-date and detailed phishing attack taxonomy, which could be used for both human education purposes as well as phishing attack discrete notation. In this paper, we propose an e-mail-based phishing attack taxonomy, which includes six phases of the attack. Each phase has at least one criterion for the attack categorization. Each category is described, and in some cases the categories have sub-classes to present the full variety of phishing attacks. The proposed taxonomy is compared to similar taxonomies. Our taxonomy outperforms other phishing attack taxonomies in numbers of phases, criteria and distinguished classes. Validation of the proposed taxonomy is achieved by adapting it as a phishing attack notation for an incident management system. Taxonomy usage for phishing attack notation increases the level of description of phishing attacks compared to free-form phishing attack descriptions.


Technologies ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 22
Author(s):  
Eljona Zanaj ◽  
Giuseppe Caso ◽  
Luca De Nardis ◽  
Alireza Mohammadpour ◽  
Özgü Alay ◽  
...  

In the last years, the Internet of Things (IoT) has emerged as a key application context in the design and evolution of technologies in the transition toward a 5G ecosystem. More and more IoT technologies have entered the market and represent important enablers in the deployment of networks of interconnected devices. As network and spatial device densities grow, energy efficiency and consumption are becoming an important aspect in analyzing the performance and suitability of different technologies. In this framework, this survey presents an extensive review of IoT technologies, including both Low-Power Short-Area Networks (LPSANs) and Low-Power Wide-Area Networks (LPWANs), from the perspective of energy efficiency and power consumption. Existing consumption models and energy efficiency mechanisms are categorized, analyzed and discussed, in order to highlight the main trends proposed in literature and standards toward achieving energy-efficient IoT networks. Current limitations and open challenges are also discussed, aiming at highlighting new possible research directions.


2011 ◽  
Vol 71-78 ◽  
pp. 4341-4344
Author(s):  
Jin Wei Tu

The paper analyzes the development status of colleges, the actual problems the graduates meet in the course employment, and the design goals and principles of employee management system. SOA employee management system was designed which based on the above conditions. The system maximizes the information shared with other systems through the implementation of the SOA system. And the system manages the information of graduates efficiently through the internet information platform of local management information system.


2001 ◽  
Vol 10 (2) ◽  
pp. 239-246 ◽  
Author(s):  
Z.M Deng ◽  
H Li ◽  
C.M Tam ◽  
Q.P Shen ◽  
P.E.D Love

2011 ◽  
Vol 271-273 ◽  
pp. 651-656
Author(s):  
Sung Han Lim

If an incident occurs on the road, the normal flow of traffic stream is interrupted and the road capacity reduces. This thus leads to huge social, economical losses, such as traffic congestion, air pollution, etc. This study was conducted to examine an effect on an incident management system by carrying out an simulation analysis and an social cost analysis. For the simulation analysis, incidents in a normal situation were compared with those in an incidental situation and thus travel time, queue length, and accident duration were selected as an evaluation indicator. It was analyzed that after an incident situation occurs, the length of vehicle in waiting rapidly increases and thus travel time also largely increases. To make an social cost analysis, vehicle operation cost (VOC) and vehicle operation time (VOT) were used an index. The results showed that travel time cost per driver and vehicle in an incidental situation all increased, compared with that in a normal situation. It was also observed that the longer the lasting hours are, the higher the travel time increases.


Author(s):  
Alberto Mendoza ◽  
Aristóteles Uribe ◽  
Claudia Z. Gil ◽  
Emilio Mayoral

Two years ago, the Mexican Transportation Institute began to develop a computer-based management system of the information collected by various organizations about accidents occurring on the Federal Road Network. This system combines the information gathered by these organizations with the purpose of completing and validating the data so that tools can be developed for processing and analyzing the validated data and the processed data and developed tools can be made available to users. It was decided to support the development of such efforts on computer databases already being generated, on database processing and management software, on geographic information systems, and on remote data-exchange systems (e.g., the Internet). The progress made so far in the development of the computer system is reviewed. The system has been named the “Relational Accident Database Management System for Mexican Federal Roads” (SAIACF, in Spanish). The information sources beneficial to this project are identified and analyzed. The ideal scheme conceived for the integration of the various information sources is presented, and the SAIACF system is outlined. Some of the results obtained after its application to the information corresponding to 1997 are shown. Also, the element that was generated to make the information and the tools available to users is described, and conclusions are drawn.


2011 ◽  
Vol 121-126 ◽  
pp. 1259-1263
Author(s):  
Zhong Min Yao ◽  
Xi Guang Liu ◽  
Ya Zhen Wang

With the application scale and area of the building PV power station continuous extension, data transmission and monitoring management of the building PV power station have become increasingly important.This paper introduces a kind of data delivering and distributed monitoring management system of the building PV power station based on ZigBee wireless network,this system has information transmission modules based on ZigBee wireless network, region monitoring and magement module and remote access module. ZigBee wireless network could deliver datas of the building PV power station to the center of region monitoring and management system,ultimately,the datas were deposited in the database of region monitoring and management system,The Electricity Regulatory Office and The Power Company used remote transmission and monitoring system by remote access system on the Internet, to access data reports of the building PV power station in the database of region monitoring and magement system.System test results can carry out the building PV power station’s data transmission, monitoring system’s data management and remote access by the Internet.


Sign in / Sign up

Export Citation Format

Share Document