Learn More
This paper focuses on the security of Internet access over the third generation mobile telecommunication networks. We explore the characteristics of cryptographic attacks and the similarities between the exposures of different secret keys in cryptographic attacks and propose three measures that limit the exposure of the sensible secret key. These measures(More)
This paper presents machine learning anti-phishing technique (MLAPT) - a machine learning framework that applies knowledge intensive approach to detect and prevent phishing attacks on email systems. Preventions, detections and a higher level of prevention measure can be guaranteed. The system is evaluated against a database of human-judged phishing(More)
The Internet worm infects the computer system, network packet, communication performance, and the traditional method of managing network using SNMP to monitor abnormal network traffic. To monitor suspicious Internet activity and to recognise the Internet worm categories, we proposed FloWorM system that can reduce the misjudgment and detection rate based on(More)
Universal Mobile Telecommunications System is the third generation mobile communications system. It was built on the concepts of GSM and is the starting point in the development of the fourth generation network. This paper proposes enhancements for the initial identification and for the Authentication and Key Agreement (AKA) protocols that solve two known(More)
The Web Service has been extended to the back-end database. In this paper, we propose a novel method of user behavior analysis in semantic network. We use the weight value to analyze and record user behavior and then check user behavior record with the signatures which are generated by the Intrusion Detection System (IDS). If a user record matches with(More)
Originally supposed to be a communication application, email is now used for a wide range of functions. Nowadays, it is increasingly becoming very difficult for email users to keep track of their email messages and to organize them such that can be retrieved easily, changed, and managed. Email tools, however have not progressed correspondingly to support(More)