- Full text PDF available (4)
This paper focuses on the security of Internet access over the third generation mobile telecommunication networks. We explore the characteristics of cryptographic attacks and the similarities between the exposures of different secret keys in cryptographic attacks and propose three measures that limit the exposure of the sensible secret key. These measures… (More)
The service oriented architecture (SOA) provides a methodology for designing software systems by integrating loosely coupled services. Compared to traditional distributed object-oriented architectures, SOA is more suitable to integrate heterogeneous systems, and more adaptable in a changing environment. This paper presents the design and implementation of a… (More)
This paper presents machine learning anti-phishing technique (MLAPT) - a machine learning framework that applies knowledge intensive approach to detect and prevent phishing attacks on email systems. Preventions, detections and a higher level of prevention measure can be guaranteed. The system is evaluated against a database of human-judged phishing… (More)
The Internet worm infects the computer system, network packet, communication performance, and the traditional method of managing network using SNMP to monitor abnormal network traffic. To monitor suspicious Internet activity and to recognise the Internet worm categories, we proposed FloWorM system that can reduce the misjudgment and detection rate based on… (More)
Can e-learning investment decisions be justifiable with the rate in which technology evolves?
Trust problems in virtual learning environments are the main problems why virtual learning environments providers do not have enough number of students to participate in these environments. This study proposed a framework to explain the factors that constitute students trust in virtual learning environments across different cultures. The variables that… (More)
The inherent characteristics of Web-based communication could be used to extend the "gallery metaphor", of lack of discrete boundaries, idiosyncrasies of transmission of information and an interface-driven environment. Part of the attraction for placing art on the Web related to the scope for interaction and feedback from a viewer base that would not… (More)