The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Organizations spend a significant amount of resources securing their servers and network perimeters. However, these mechanisms are not sufficient for protecting databases. In this paper, we present a new technique for identifying malicious database transactions. Compared to many existing approaches which profile SQL query structures and database user activities to detect intrusions, the novelty of...
Organizations face a growing threat of insider attacks. This paper presents a model for detecting insider malicious activities targeted at tampering the contents of files for various purposes. It employs two-dimensional traceability link rule mining to identify intrinsic file dependencies. Traceability links are traditionally used by software practitioners and researchers to uncover the relationships...
Z Formal method not only can improve correctness and reliability of software, but also improve development efficiency. Although Z specifications have been widely studied in literatures, very little work is involved in definition and use of variables. This paper discussed on definition and use of variables by an example. Finally, it is applied to data flow analysis and data dependent analysis.
Improvement of contour precision is one of the important issues in counter-following applications. Currently cross-coupled control method is widely adopted in industrial motion controller, which can significantly reduce contouring error composed by multiaxis. Conventional cross-coupled controller, however, is a centralized one which must be implemented as a whole in computer numerical controller (CNC)...
Existing database misuse detection systems are not well equipped to identify malicious activities carried out by legitimate users of the system. In this paper we present a model that can prevent malicious insider activities at the database application level. Our model is based on user tasks, each of which maps to several transactions. An implementation-oriented approach is described to validate these...
Drying characteristics of sewage sludge were investigated using hot air of a temperature range of 50~80degC and an air velocity range of 0.60~1.48 m/s at a laboratory scale dryer. Several mathematical models available in the literatures were fitted to the experimental data by multiple nonlinear regression analysis. Four statistical parameters: coefficient of determination (R2), reduced chi-square...
Many natural language processing tasks, such as text classification, text clustering, text summarization, and information retrieval etc., cannot miss the step-relevance measure of inter-sentence. However, many of the current NLP system always calculate not the inter-sentence relevance but their similarity. In fact, similarity means differently from relevance. The similarity measure can be acquired...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.