3 resultados para pay-to-stay
em AMS Tesi di Laurea - Alm@DL - Università di Bologna
Resumo:
One of the most undervalued problems by smartphone users is the security of data on their mobile devices. Today smartphones and tablets are used to send messages and photos and especially to stay connected with social networks, forums and other platforms. These devices contain a lot of private information like passwords, phone numbers, private photos, emails, etc. and an attacker may choose to steal or destroy this information. The main topic of this thesis is the security of the applications present on the most popular stores (App Store for iOS and Play Store for Android) and of their mechanisms for the management of security. The analysis is focused on how the architecture of the two systems protects users from threats and highlights the real presence of malware and spyware in their respective application stores. The work described in subsequent chapters explains the study of the behavior of 50 Android applications and 50 iOS applications performed using network analysis software. Furthermore, this thesis presents some statistics about malware and spyware present on the respective stores and the permissions they require. At the end the reader will be able to understand how to recognize malicious applications and which of the two systems is more suitable for him. This is how this thesis is structured. The first chapter introduces the security mechanisms of the Android and iOS platform architectures and the security mechanisms of their respective application stores. The Second chapter explains the work done, what, why and how we have chosen the tools needed to complete our analysis. The third chapter discusses about the execution of tests, the protocol followed and the approach to assess the “level of danger” of each application that has been checked. The fourth chapter explains the results of the tests and introduces some statistics on the presence of malicious applications on Play Store and App Store. The fifth chapter is devoted to the study of the users, what they think about and how they might avoid malicious applications. The sixth chapter seeks to establish, following our methodology, what application store is safer. In the end, the seventh chapter concludes the thesis.
Resumo:
In 2011 the GSB/USB caving group of Bologna has discovered, in the southern fossil branches of Govjestica cave (Valle di Praça, Bosnia) a fossil deposit of vertebrates containing bones of Ursus spelaeus, Capra ibex, Cricetulus migratorius and Microtus. On the basis of the U/Th ages of the bones, teeth and carbonate flowstone covering the fossils (60 ka), datings carried out in the laboratories of U-Series at Bologna, and on the disposition of the bones, a past connection between Govjestica and the nearby Banja Stjena cave is hypothesised. The closure of this passage has occurred suddenly through a collapse that has forced the last cave bears awakened from their winter sleep to stay blocked in Govjestica, and die. The connecting passage has later been covered with calcite flowstones and is no longer visible. This hypothesis is sustained by the rather scarce number of skeletons of cave bears found in Govjestica (a dozen of skulls against the often large amounts of cave bears found in similar caves): Govjestica cave, and especially the Room of the Bones in its southern part, has been used by cave bears only for a couple of centuries before these parts became inaccessible. Furthermore, the entrance of Banja Stjena cave was probably located close to or at the level of the Praça river, that has excavated its thalweg for around 20 metres in the last 60 ka.
Resumo:
The our reality is characterized by a constant progress and, to follow that, people need to stay up to date on the events. In a world with a lot of existing news, search for the ideal ones may be difficult, because the obstacles that make it arduous will be expanded more and more over time, due to the enrichment of data. In response, a great help is given by Information Retrieval, an interdisciplinary branch of computer science that deals with the management and the retrieval of the information. An IR system is developed to search for contents, contained in a reference dataset, considered relevant with respect to the need expressed by an interrogative query. To satisfy these ambitions, we must consider that most of the developed IR systems rely solely on textual similarity to identify relevant information, defining them as such when they include one or more keywords expressed by the query. The idea studied here is that this is not always sufficient, especially when it's necessary to manage large databases, as is the web. The existing solutions may generate low quality responses not allowing, to the users, a valid navigation through them. The intuition, to overcome these limitations, has been to define a new concept of relevance, to differently rank the results. So, the light was given to Temporal PageRank, a new proposal for the Web Information Retrieval that relies on a combination of several factors to increase the quality of research on the web. Temporal PageRank incorporates the advantages of a ranking algorithm, to prefer the information reported by web pages considered important by the context itself in which they reside, and the potential of techniques belonging to the world of the Temporal Information Retrieval, exploiting the temporal aspects of data, describing their chronological contexts. In this thesis, the new proposal is discussed, comparing its results with those achieved by the best known solutions, analyzing its strengths and its weaknesses.