1,863 research outputs found

    CCBS – a method to maintain memorability, accuracy of password submission and the effective password space in click-based visual passwords

    Get PDF
    Text passwords are vulnerable to many security attacks due to a number of reasons such as the insecure practices of end users who select weak passwords to maintain their long term memory. As such, visual password (VP) solutions were developed to maintain the security and usability of user authentication in collaborative systems. This paper focuses on the challenges facing click-based visual password systems and proposes a novel method in response to them. For instance, Hotspots reveal a serious vulnerability. They occur because users are attracted to specific parts of an image and neglect other areas. Undertaking image analysis to identify these high probability areas can assist dictionary attacks. Another concern is that click-based systems do not guide users towards the correct click-point they are aiming to select. For instance, users might recall the correct spot or area but still fail to include their click within the tolerance distance around the original click-point which results in more incorrect password submissions. Nevertheless, the Passpoints study by Wiedenbeck et al., 2005 inspected the retention of their VP in comparison with text passwords over the long term. Despite being cued-recall the successful rate of their VP submission was not superior to text passwords as it decreased from 85% (the instant retention on the day of registration) to 55% after 2 weeks. This result was identical to that of the text password in the same experiment. The successful submission rates after 6 weeks were also 55% for both VP and text passwords. This paper addresses these issues, and then presents a novel method (CCBS) as a usable solution supported by an empirical proof. A user study is conducted and the results are evaluated against a comparative study

    Responsibility and non-repudiation in resource-constrained Internet of Things scenarios

    Get PDF
    The proliferation and popularity of smart autonomous systems necessitates the development of methods and models for ensuring the effective identification of their owners and controllers. The aim of this paper is to critically discuss the responsibility of Things and their impact on human affairs. This starts with an in-depth analysis of IoT Characteristics such as Autonomy, Ubiquity and Pervasiveness. We argue that Things governed by a controller should have an identifiable relationship between the two parties and that authentication and non-repudiation are essential characteristics in all IoT scenarios which require trustworthy communications. However, resources can be a problem, for instance, many Things are designed to perform in low-powered hardware. Hence, we also propose a protocol to demonstrate how we can achieve the authenticity of participating Things in a connectionless and resource-constrained environment

    The Role Which Faculty Members at Al-Hussein Bin Talal University Have the Principles of Brain-Based Learning Theory

    Get PDF
    The aim of this study was to find out the extent to which the faculty members of Al-Hussein Bin Talal University have the principles of learning theory based on the brain. The study sample consisted of 70 faculty members, of which 54 were male faculty members. The researcher used the questionnaire tool to measure the extent principles of the faculty members of brain-based learning theory. The results showed the following: 1. The faculty members have knowledge of the principles of brain-based learning.It came in the first place with a high degree field (realized that every brain is unique). The field came at the last and intermediate level (I know that the brain is designed to recognize and generate patterns). 2. There are statistically significant differences for faculty members who have more than 10 years' experience to own the principles of brain-based learning theory. 3. There are no statistically significant differences due to gender in the extent of ownership faculty members at Al-Hussein Bin Talal University. Keywords: principles of brain , learning theory. DOI: 10.7176/JEP/11-5-06 Publication date: February 29th 2020

    Reliability evaluation of scalable complex networks through delta-star conversion

    Get PDF
    Exact reliability evaluation of large size complex networks becomes intractable with conventional techniques due to the exponential scaling of the computation complexity as the size of network scales up. In this paper we develop a scalable model for the exact evaluation of system reliability of scalable complex networks of the n-tuple bridge type based on scaled delta-star conversion. The number of steps as well as the computation overhead is kept within practical limits as they scale up linearly with the size of the network. The proposed model enables simple numerical evaluation either manually or through spread-sheets

    Women Lost, Women Found: Searching for an Arab-Islamic Feminist Identity in Nawal El Saadawi’s \u3cem\u3eTwelve Women in a Cell\u3c/em\u3e in Light of Current Egyptian Spring Events

    Get PDF
    Dr. Nawal El Saadawi, an Arab feminist, playwright, novelist, and thinker, has been one of the most controversial literary figures in Arab contemporary literature. In this paper, I examine El Saadawi’s 1984 play Twelve Women in A Cell in light of the ongoing political dissidence that gave birth to the recent Arab Spring and its intricate relation to feminist dissidence. The play published twenty-eight years ago, deals with a bizarre situation that surprisingly and sadly, is still relevant to women’s struggle within Arab-Islamic hegemony. The cell that hosts twelve Egyptian women, in El Saadawi’s play, becomes the Arabic Islamic patriarchal world, within which these women struggle as their ultimate goal becomes survival. The cell hosts many types of women like a university professor, a prostitute, an atheist, and a fundamentalist Muslim, who only have their femaleness as the common ground on which they can salvage existence and their salvation

    Recovery modeling in MPLS networks

    Get PDF
    Transmission of QoS based traffic over packet switched network typically requires resource reservation or differentiated treatment to guarantee an acceptable level of performance. But it is also essential to bound the disruption caused by failure of nodes or links for a real time traffic to a limit that is acceptable by the application. In this paper, a simulation platform models the impact of the MPLS recovery/protection schemes on the QoS traffic parameters including disruption time and number of out of order packets arriving at the destination. The simulation considers measures to alleviate drawbacks caused by recovery process

    Adaptive Traffic Fingerprinting for Darknet Threat Intelligence

    Full text link
    Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such, there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes. However, anonymity in cyberspace has always been a domain of conflicting interests. While it gives enough power to nefarious actors to masquerade their illegal activities, it is also the cornerstone to facilitate freedom of speech and privacy. We present a proof of concept for a novel algorithm that could form the fundamental pillar of a darknet-capable Cyber Threat Intelligence platform. The solution can reduce anonymity of users of Tor, and considers the existing visibility of network traffic before optionally initiating targeted or widespread BGP interception. In combination with server HTTP response manipulation, the algorithm attempts to reduce the candidate data set to eliminate client-side traffic that is most unlikely to be responsible for server-side connections of interest. Our test results show that MITM manipulated server responses lead to expected changes received by the Tor client. Using simulation data generated by shadow, we show that the detection scheme is effective with false positive rate of 0.001, while sensitivity detecting non-targets was 0.016+-0.127. Our algorithm could assist collaborating organisations willing to share their threat intelligence or cooperate during investigations.Comment: 26 page

    Hypothesis of Interaction: Reflections on its Theoretical and Practical Contributions for Second Language Acquisition (SLA)

    Get PDF
    This article is about one of the most influential hypothesis in the fields of applied linguistics and language learning. It is based on the work of a number of scholars who contributed to the understanding of this hypothesis such as Steve Krashen, Mike Long, Teresa Pica and Merrill Swain. It starts with a brief introduction about the significance of interaction hypothesis generally in language learning in general and its central role in second language acquisition (SLA). The next section reviews some of the fundamental works and studies that have investigated the theoretical and practical understanding of this phenomenon and its relationship to learners’ achievement. It also highlights the contribution of interaction hypothesis to learning in two basic areas: noticing and feedback. There are explanatory examples presented in the following section in order to show how interactional modification techniques are used by learners. The last section presents some concluding thoughts pertaining to this topic with a focus on how it can be employed in language learning classrooms

    Analysis of Accident Data and Evaluation of Leading Causes for Traffic Accidents in Jordan

    Get PDF
    Road safety is a primary concern and goal of highway and traffic engineers worldwide. The road network in Jordan exhibits relatively high traffic volumes, particularly in urban areas and in the Central Business District (CBD) areas of major cities. Jordan ranks one of the top countries worldwide in terms of having higher numbers of road traffic accidents leading to a relatively high number of fatalities and injuries. In the past few years in particular, the number of registered vehicles in Jordan has considerably increased. As a result, traffic volumes and Vehicle Miles of Travel (VMT) have significantly increased leading to deteriorating traffic flows and escalating traffic congestions and jams. Consequently, the number of road traffic accidents has also noticeably increased in Jordan in the past decade. Complete analysis of statistical data obtained for traffic accidents in Jordan was conducted in this study. Evaluation of the possible leading causes of traffic accidents in Jordan was also carried out. Different possible causes along with behaviors of drivers and pedestrians were investigated and correlated with the number of traffic accidents, fatalities and injuries. Jordan was found to have accident, fatality and injury rates that are considerably higher than those of other countries in the world. Nonetheless, as rates with time, the fatality and injury rates seemed to be moving in the right direction. Yet, the number of traffic accidents, fatalities and injuries looked critical. Traffic accidents and casualties were observed to be higher in summer times. More than 90 percent of traffic accidents, fatalities and injuries occurred on roads with speed limits between 40 and 60 km/h. Pedestrians composed the highest percentage of the total numbers of fatalities and injuries. The majority of driver casualties and passenger casualties (fatalities and injuries) belonged to the age group of 18-42 years. On the other hand, the highest percentage of pedestrian casualties belonged to the age group of 0-18 years. However, about 80 percent of the casualties in Jordan were males and only 20 percent were females. “Tailgating” and “not taking safety measurements during driving” were the most two important driver behaviors in terms of traffic accidents. Yet, behaviors of “using wrong lane” and “not taking safety measurements during driving” led to the highest percentages of the total number of fatalities and injuries. The majority of the pedestrian fatalities and injuries were in fact walking on road during the time of the accident occurrence and about one third of them were walking on sidewalk. Other behaviors of drivers and pedestrians were also important and created traffic complexity and hazardous situations leading to a reduction in saturation flow rates and in capacities and causing bottleneck conditions and traffic jams; hence resulting in traffic safety concerns

    Circulating immune complexes in thyroid disorders and diabetes mellitus

    Get PDF
    corecore