Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In recent years, machine learning technology often used as a recognition method of anomaly in anomaly detection. In this paper we have proposed a One-class small hypersphere support vector machine classifier (OCSHSVM) algorithm, which builds a learning classifier model via both normal and abnormal network traffic. This combination of normal and abnormal traffic for training model gives the better...
Combinatorial exchanges are double sided marketplaces with multiple sellers and multiple buyers trading with the help of combinatorial bids. The allocation and other associated problems in such exchanges are known to be among the hardest to solve among all economic mechanisms. It has been shown that the problems of surplus maximization or volume maximization in combinatorial exchanges are inapproximable...
Combinatorial exchanges are double sided marketplaces with multiple sellers and multiple buyers trading with the help of combinatorial bids. The allocation and other associated problems in such exchanges are known to be among the hardest to solve among all economic mechanisms. In this paper, we develop computationally efficient iterative auction mechanisms for solving combinatorial exchanges. Our...
Application based intrusion detection involves analysis of network packet payload data. Recently statistical methods for analyzing the payload are being used. Since behavior of every application is not same a different model is necessary for each application. Studies have revealed that higher order n-grams are good for capturing the network profile. In this paper we introduce a concept of layered...
Dynamic spectrum access can enable secondary network users to access unused spectrum, or whitespace, which is found between the transmissions of primary users in a wireless network. The main design objectives for secondary user access strategy are to be able to "scavenge" spatio-temporally fragmented whitespace opportunities while limiting the amount of interference caused to the primary...
Dynamic spectrum access can enable secondary network users to access unused spectrum, or whitespace, which is found between the transmissions of primary users in a wireless network. The main design objectives for secondary user access strategy are to be able to ??scavenge?? spatio-temporally fragmented whitespace opportunities while limiting the amount of interference caused to the primary users....
Most of the anomaly based techniques produce vast number of alert messages that include a large percentage of false alarms. One of the widely used technique for anomaly intrusion detection systems (IDS) is cluster analysis. In cluster based IDS, feature vectors generated from network traffic are grouped into clusters as normal or abnormal (raising alert). The main cause for false alert generation...
In this paper, we use reliability theory to determine the answer of an important question about how often we need to update a piece of secure information. For example, one may need to determine an appropriate time for updating a new password. To generalize, we compute an efficient updating time for a dependable secure computing (DSC) system which stores secret information in a reliable and secure...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.