The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: computer science applications; embedded systems; wireless channels; data analysis; mobility management; mobile robots; loop antenna; Internet; security of data; neural networks; expert systems; data mining; and natural languages.
Nowadays, a problem of data protection is the main research object of numerous companies and scientists. Email gateway always will be one of the main components of security perimeter. It helps to protect the internal network from the large varieties of hacker's attacks such as phishing and social engineering. In our previous research we have developed concept and prototype of protection system. Now...
Outlier detection methods have been suggested for a broad range of applications. They are obligatory in different monitoring tasks (e.g. mobile phone monitoring, credit card usage monitoring). Aim is the detection of sudden changes in the usage pattern which may indicate deviations from normal usage. Parametric (statistical) and non parametric methods combined with univariate and multivariate methods...
Kernel principal component analysis (KPCA) has been effectively applied as an unsupervised non-linear feature extractor in many machine learning applications and suggested for various data stream classification tasks requiring a nonlinear transformation scheme to reduce dimensions. However, the dimensionality reduction ability is restricted because of KPCA's high time complexity. So the practicality...
Meeting distributed detection's requirements of accuracy, expansibility and portability, ontology is introduced to organize and systematize all intrusion detection behavior at any level, consequently reducing ambiguity and supporting share. The paper presented ontology-based intrusion detection model with advantages of hierarchical and cooperative models, and then the deduction of expert system was...
The following topics are dealt with: intelligent system design; neural networks, AI and expert systems; evolutionary computation; genetic algorithms; natural language processing & machine translation; artificial life and artificial immune systems; rough and fuzzy rough set; gray system and cloud computing; cognitive radio and computer vision; pattern recognition and machine learning; fuzzy system...
It is an urgent task for securities investment managers to enhance their securities investment decision-making by taking advantage of artificial intelligence. This paper aims to build an intelligent securities investment decision-making support system, and uses data-driven decision-making support methodology to conduct an in-depth analysis of the prominent issues in knowledge-based securities investment...
The following topics are dealt with: database technology; expert system; text-based information retrieval; keyword extraction; Web search; Web semantics; and information security management.
After defining the idea of Convert channel, this paper analyses detecting methods of convert channel including syntactic information flow analysis and semantic information flow approach. This paper put forwards one method of improved syntactic information flow processing whose core idea is to design PC to sign every row of program in this kind of method, and detect the covert information flow by this...
The performance of biometric systems can be significantly affected by changes in signal quality. In this paper, two types of changes are considered: change in acquisition environment and in sensing devices. We investigated three solutions: (i) model-level adaptation, (ii) score-level adaptation (normalisation), and (iii) the combination of the two, called “compound” adaptation. In order to cope with...
In order to solve the implementation efficiency problem of the network information system security policy, an improved object-oriented Rete algorithm and network structure model are proposed. The control methods of the nodes and tokens in the matching algorithm with the pattern join order are studied, that core idea is to use the separate matches to construct matching tree dynamically based on content...
A model is proposed for security assessment system based on providing strategy and expert system. A system is designed under the frame of this model which can assess the security risk efficiently. In the process of development, fuzzy theory is employed to analyze the data from port scan, digraph method to analyze the data from vulnerability scan. Expert system CLIPS is used to realize the vulnerability...
Biometric authentication techniques such as lips, face, and eyes are more reliable and efficient than conventional authentication techniques such as password authentication, token, cards, personal identification number, etc. In this research paper, the emphasis has been laid on the speaker identification based on lip features. In this study, we have presented a detailed comparative analysis for speaker...
This research determines the feasibility of using an Exsys Corvid based expert system to detect and respond to network threats and appropriately administrate a Linux-based iptables firewall in real-time. In our implementation, we attempt to replace the human domain expert required for creating the expert system knowledge base with intrusion detection rules created by data-mining on network traffic...
Information security is a serious issue especially in present age because a solo attack may cause a big harm in computer and network systems. Several intrusion detection approaches exist to tackle this critical issue but the problem is which one is more suitable in the field of intrusion. Further, these approaches are used in intrusion detection systems. Therefore, in this paper, we evaluated them...
With the developing of the electric power automation level, the power system depends on the power information network protecting its safety, reliability and efficiency increasingly. As electric power information system achieves networking, their entire network's security also faces enormous risks. Any security problems from this information network are likely to affect power system security, stability...
High computational cost has always been a constraint in processing huge network intrusion data. This problem can be mitigated through feature selection to reduce the size of the network data involved. In this research work, we first consider existing feature selection methods that are computationally feasible for processing huge network intrusion datasets. Each of the feature selection methods was...
Signature-based Intrusion Detection Systems have numerous redundant rules that do not match network attacks during intrusion detections. Instead, the toolkits have low efficacies in matching each packet with all the detection rules to avoid false positives. Unfortunately, there are no automatic functionalities to debug expert systems so that all noisy signatures and rules set that trigger false alerts...
Virtual communities of practice are gaining attention among scholars and practitioners as managers and high-level executives look for ways to adapt to an ever-increasing rate of environmental change. These communities have been recognized as a tool for generating new ideas by accessing geographically distributed expertise. As most expert knowledge is tacit and tacit knowledge exchange is what leads...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.