The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the increasing popularity of RFID applications, RFID protocols are widely discussed. Most RFID protocols use a central database to store the RFID tag data, while severless RFID protocols are proposed to provide users with security and privacy protection without the connection and security problem between readers and sever. The shortcoming of severless RFID protocols is that the reader is authorized...
To investigate the issue of the Internet public opinion mining. To show how to get web page information from the Internet, purify and convert the web page to appropriate format processed by computer. To find topic based on a new clustering algorithm which need not calculate all similarity and is more effective than the traditional clustering algorithm. At last discuss the hotspot detection and tracking...
Broadband networks have been well developed and increasedly applied in Chinese industries' and organizationspsila networks. The security problems in broadband networks are discussed widely and frequently. There exit various network security protection tools, such as firewall, IDS (intrusion detection system), leak scanning and so on. All these tools deal with packet heads, not with detailed packet...
In Intrusion Detection Systems, many intelligent information processing methods, data miming technology and so on have been applied to generating attack signatures automatically, updating signatures easily and improving detection accuracy with ultra data set. This paper presents an improved association rule discovering system under rough set theory framework of modeling IDSs. The system makes association...
Intrusion Detection System has some defects, such as signatures being generated manually, updating attack signatures difficultly and doing nothing in front of ultra data set. This paper presents a hybrid approaches for modeling IDS. Association rule mining and Rough set theory are combined as a hierarchical hybrid intelligent system model. The hybrid intrusion detection model combines association...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.