The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper creates a new E-Government security framework based on Immune Agent, and it describes a new deployment policy of E-Government network system based on Immune Agent. On the theoretical basis, this thesis elaborates the detailed design and implementation of a particular E-Government network system. To meet the needs of practical security and provide strong protection, the system is developed...
In this paper, we examine general mechanisms that a network covert channel may exploit, and we characterize the essence of network covert channels, which are decided by overt sources. So we present a taxonomy of network covert channels based on entropy of overt sources. We classify overt sources into three categories, as variety entropy, constrant entropy and fixed entropy sources, and name the network...
Network security situation awareness (NSSA) is a hotspot in the network security research field, based on the security situation values, decision makers can be aware of the actual security situation of their networks and then make rational decision to make their networks safer. In this paper, we build a multi-level quantization model for NSSA firstly; this model is comprised of three levels, namely,...
Risk assessment is a very important tool to acquire a present and future security status of the network information system. Many risk assessment approaches consider the present system security status, while the future security status, which also has an impact on assessing the system risk, is not taken into consideration. In this paper we propose a novel risk assessment model based on Markov game theory...
Attack model is the foundation for organizing and implementing attacks against the target system in Attack Resistance Test. By redefining the node of the attack tree model and redescribing the relation of the attack tree nodes, we build a penetration attack tree model which can describe, organize, classify, manage and schedule the attacks for Attack Resistance Test. The organization method of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.