Security Protection Mechanism for Social Networking Websites Based on Real-Time Proxy
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 10, Issue 3
Abstract
During the last two decades Information technology has grown tremendously and became the main source of knowledge. In past few years the world getting closer and closer this is only because of Social networking websites such as Facebook, Twitter etc. Yet with usefulness and the popularity, the misuse and cybercrime are more evident. So prevention and detection of these threats is become a major challenge To minimize this risk of accessing social networking applications we proposed anapplication. The idea is to integrate many commercial software and online security services into a security module, simultaneously execute webpage security threat scan, then scanthe information sent by the web server with security module before sending to the client. If security threats were found in the web page, the system will add this web page to the blacklist and issue a warning to the client side to prevent attack. Later on, as long as the client is to receive the webpage in the blacklist, a warning will be issued to the client side. Through this mechanism, we can lower the security risk of the clients using social networking websites.
Authors and Affiliations
Komal Navale , Rajendra Pisal , Vishal Suravase , Santosh Reddy
Performance Enhancement of a Novel Interleaved Boost Converter by using a Soft-Switching Technique
In this paper a novel Interleaved Boost Converter (IBC) with soft-switching techniques is proposed. Through the zero-voltage switching (ZVS) and zero-current switching (ZCS) reduces the current stress of the main circuit...
Ensuring Accountability for Data Sharing in Cloud
Cloud computing is emerging rapidly as part of latest developments in communication trends and technology. It brought revolution in today’s world among key stakeholders like service providers and consumers. As a result,...
Automatic Database Clustering: Issues and Algorithms
Clustering is the process of grouping of data, where the grouping is established by finding similarities between data based on their characteristics. Such groups are termed as Clusters. Clustering is an unsupervised lear...
Analyzing the Road Traffic and Accidents with Classification Techniques
Data mining is the process of extracting data’s from the database engines. Now a days the road traffic and accidents are main area for the researchers to discover the new problems behind that. It is commonly used in a ma...
Recognition of Consonants in Isolated Punjabi Words using DWT
Speech is the medium through which human beings can communicate with each other efficiently. Speech synthesis and recognition are two phases of speech. In this paper, focus is given on speech recognition. Speech recognit...