The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The information security is very important to the development of electronic commerce. Inspired by the immune principle, the paper designs an Immune-based Distributed Forensics System for e-Commerce (IDFSEC). The system consists of distributed and independent nodes which monitor hierarchical objects from network to service in the e-Commerce site. The paper presents the forensics mechanism of node and...
This paper proposes a novel Immune-based adaptive intrusion detection model (IAIDM). In the model, a minimally complete detector repertoire is firstly specified to avoid the heavy iterative process for detector generation in traditional immune mode. Meanwhile, it provides better characterization of the boundary between self space and nonself space with density of cells. Secondly, a mechanism of abnormity...
Because of huge size of rule set, intrusion detection systems(IDSs) usually take dynamic update strategy which realizes all of rules to be replaced once in a period of time, which is costing times for spaces. Under such strategy, IDSs may not realize the flexible detection according to different states of network security. Based on the immune principle of antigen presenting, this paper proposes a...
As information and network security is exposing to increasing evil threats significantly, authentication is now playing a more and more important role in security defense system. In this paper, a model that authenticates and identifies access to computer systems and networks by applying keystroke manner is put forward. In the model, legitimate user's typing manner such as durations of keystrokes and...
Because there existed the problem of incomplete training sets in current intrusion detection systems, it results in false positive errors. In the paper, an ID model-IAIDM (immune-based adaptive intrusion detection model) is firstly put forward. Based on the characteristics of IAIDM, a analytical method of discrete random process is introduced to estimate the ratio of false positive errors. The analytical...
Current researches on multiple-input multiple-output (MIMO) channel treat it as a kind of Gaussian channel. Without considering the spatial-temporal correlation, considerable deviation exists in output. This paper presents a novel spatial-temporal correlation model (STCM) for MIMO channel modeling. We adopt a correlation matrix to model the spatial correlation at the base and use wave superposition...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.