Attackers seeking to deceive web users into visiting malicious websites can exploit limitations of the tools intended to help browsers translate domain names containing non-ASCII characters, or internationalized domai...
详细信息
ISBN:
(纸本)9781728138763
Attackers seeking to deceive web users into visiting malicious websites can exploit limitations of the tools intended to help browsers translate domain names containing non-ASCII characters, or internationalized domain names (IDNs). These attacks, called homograph phishing, involve registering unicode domain names that are visually similar to legitimate ones but direct users to distinct servers. Tools exist to identify when domains use non-ASCII characters, which get translated by the Punycode protocol to work with the Domain Name System (DNS);however, these tools cannot automatically distinguish between benign use cases and ones with malicious intent, leading to high rates of false-positive alerts and increasing the workload of analysts looking for evidence of homograph phishing. To address this problem, we present PunyVis, a visual analytics system for exploring and identifying potential homograph attacks on large network datasets. By targeting instances of Punycode that use easily-confusable ASCII characters to spoof popular websites, PunyVis quickly condenses large datasets into a small number of potentially malicious records. Using the interactive tool, analysts can evaluate potential phishing instances and view supporting information from multiple data sources, as well as gain insight about overall risk and threat regarding homograph attacks. We demonstrate how PunyVis supports analysts in a case study with domain experts, and identified divergent analysis strategies and the need for interactions that support how analysts begin exploration and pivot around hypotheses. Finally, we discuss design implications and opportunities for cyber visual analytics.
Currently, to support gender inclusive codepoints (for example, gender inclusive can be defined as male/female to an equal degree, can neither be confidently identified as male/female, etc.) all major platforms defaul...
详细信息
ISBN:
(纸本)9781450366755
Currently, to support gender inclusive codepoints (for example, gender inclusive can be defined as male/female to an equal degree, can neither be confidently identified as male/female, etc.) all major platforms default to a male or a female design. So, if someone were to send a text to their friend from a Microsoft device, "Love a good mansplain " their friend, if reading from an iPhone will see, " Love a good mansplain " even though both of these emojis map to U+1F926. This creates all kinds of cross platform inconsistencies and in some cases reinforces stereotypes.(1)
There are many CSS styling issues in the display of regional languages. This paper describes the CSS styling issues for Punjabi language. A number of Punjabi websites have been analyzed to find out the CSS styling iss...
详细信息
ISBN:
(纸本)9781467369114
There are many CSS styling issues in the display of regional languages. This paper describes the CSS styling issues for Punjabi language. A number of Punjabi websites have been analyzed to find out the CSS styling issues. The websites use unicode and non-unicode Gurmukhi fonts to write the content in Punjabi. But, the non-unicode Gurmukhi fonts may not be compatible with the user's system. The analysis for the same is also presented in this paper. To find out more related problems, a web application has been designed using which the end user can apply the CSS styles to his/her own Punjabi text. The effect of applying the CSS styles may vary for different operating systems as well as for different web browsers. The issues reported by the end user will be saved in a database for analysis.
Korean script Hunminjeongeum (correct sounds to teach the people), called Hangul, that was distributed in 1446 can generate 39.9 billion syllabic characters by 28 basic alphabets and 5 rules. Current Hangul on compute...
详细信息
ISBN:
(纸本)9783540694281
Korean script Hunminjeongeum (correct sounds to teach the people), called Hangul, that was distributed in 1446 can generate 39.9 billion syllabic characters by 28 basic alphabets and 5 rules. Current Hangul on computer lost scientific properties and then cannot generate all of 39.9 billion syllables because choosing syllable as a target among encoding objects of syllable, syllabic primitive, and alphabet. In this paper, we propose a coding scheme and a method of generating fonts so as to represent all syllabic characters defined in Hunminjeongeum.
The message recorder uses micro controller to control the GSM module to send and receive messages, and connect with the micro-printer by Universal Asynchronous Receiver Transmitters (UART) expansion, it can display me...
详细信息
ISBN:
(纸本)9787506292207
The message recorder uses micro controller to control the GSM module to send and receive messages, and connect with the micro-printer by Universal Asynchronous Receiver Transmitters (UART) expansion, it can display message on LCD and print the message content through the keyboard. The printed content of message can be formatted and the count of it is infinite. This device can receive and save a great deal of notes in a short time, in spite of the limit of the common mobile memory. This method is validated through the result of the experiment. The size of the equipment is small, the capacity of the information is large. And it has the advantage of low power consumption and fast speed of transmittal. The message recorder can be widely used in the field of information record transmission.
This paper discusses the rendering issues of complex text layout - traditional Mongolian script. The traditional Mongolian script has been standardized in unicode. We analyzed existing OpenType fonts and their renderi...
详细信息
Character recognition from scanned images is a very complex task. But as for record keeping we require all the data in digital format to perform various manipulation operations. The main issue in case of character rec...
详细信息
ISBN:
(纸本)9781509011117
Character recognition from scanned images is a very complex task. But as for record keeping we require all the data in digital format to perform various manipulation operations. The main issue in case of character recognition is the different styles and fonts in which the text is written. We proposed a new approach by using the concept of Artificial Neural Network and Nearest Neighbour approach for character recognition from scanned images. Three layers are used for classification purpose. First is the input layer consist the input given by the segmented characters, then hidden layer consist the neurons trained by the training network and the output layer consist output neurons to generate unicode.
The Internet was born of academic efforts to share information;it never strove for high security measures. It plays important role in becoming people online, this mode is easy and effective but dangerous too in terms ...
详细信息
ISBN:
(纸本)9781467350907
The Internet was born of academic efforts to share information;it never strove for high security measures. It plays important role in becoming people online, this mode is easy and effective but dangerous too in terms of data hacking and cracking by unauthorized persons. It is needed that while using Internet data must be secured and personal. Encryption can be used to protect data in transit, for example data being transferred via network (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines. Encrypting data in transit also helps to secure it as it is often difficult to physically secure all access to networks. Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed to protect the integrity and authenticity of a message;for example, verification of a message authentication codes (MAC) or a digital signature. Standards and cryptographic software and hardware to perform encryption are widely available, but successfully using encryption to ensure security may be a challenging problem. A single slip-up in system design or execution can allow successful attacks. Sometimes an adversary can obtain unencrypted information without directly undoing the encryption. In this paper an attempt is made to develop new encryption and decryption algorithm and implemented in Java, it gives very encouraging results in small as well as in large data files.
Preserving old archives with readable and editable structure helps people to gain additional experience. Tulu is one of five noteworthy Dravidian dialect with numerous Tulu historical documents which are available wit...
详细信息
ISBN:
(纸本)9781509008490
Preserving old archives with readable and editable structure helps people to gain additional experience. Tulu is one of five noteworthy Dravidian dialect with numerous Tulu historical documents which are available within handwritten form. Tulu scripts are rich in patterns with many combinations of connected characters. Henceforth, machine recognition is a major challenge. Till now, no strategy is reported to recognize the Tulu script which is an ancient script in South India. The main aim of this paper is to introduce the salient features of Tulu script and listing the approaches utilized for handwritten character recognition. Subsequently, giving future research directions on recognition and understanding of Tulu script.
basically, computers just deal with numbers. They can store letters and other characters by assigning a number for each one. Before unicode was designed, there were found hundreds of different encoding systems for ass...
详细信息
ISBN:
(纸本)9781479949106
basically, computers just deal with numbers. They can store letters and other characters by assigning a number for each one. Before unicode was designed, there were found hundreds of different encoding systems for assigning these numbers. No single encoding could contain sufficient characters: As for example, the European Union alone requires several different encodings to cover all its languages. Even for a solo language like English no solo encoding was adequate for all the punctuation, letters and technical symbols in common use. But unicode takes 16-bits to represent a character that consumes more memory space and also increases the traffic over transmission. This paper describes the Group-code technique which can represent every character of different languages in 8bit. Group-code contains all the characters of different languages in different groups. But every group represents a specific languages and member of particular group represents character of that particular group language.
暂无评论