The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to quantify the risk of security vulnerabilities, a vulnerability risk assessment methodology is proposed based on connectivity Operators, and vulnerability relationship is quantitatively analyzed on the use of the vulnerability attack graph. Two kinds of connectivity operator are proposed to calculate the connectivity between vulnerability, achieving a quantitative analysis of the vulnerability's...
To solve the information security defense strategy selection problem, we established a non-cooperation and non-zero attack-defense game model, for the attacker and the defender has the features of confrontational goal, strategy dependence and non-cooperative relations. An improved quantization benefits and calculation method is proposed in the model, which can calculate the game equilibrium more accurately...
Aiming at the clustering problems in selected features and the shortcomings that fuzzy C-means clustering is sensitive to initial value and easy to fall into local optimum, a new fuzzy subspace clustering algorithm based on improved firefly algorithms is proposed. Based on fuzzy C-means clustering algorithm, the algorithm uses a method of calculating feature weighting in reliability-based k-means...
In cloud computing, the resources of service are widely distributed, complex and fickle. The trust relationship between service entities is hard to establish and maintain with high uncertainty. The characteristics of randomness and fuzziness of services could not be responded by traditional trust evaluation approach comprehensively, a service trust evaluation method based on weighted multi-attribute...
The prediction of Chaotic time series constitutes a hot research topic of chaos theory, it is widely used in signal processing and automatic control field. In order to sufficiently model time series, on the base of the theory of phase-space reconfiguration, using the advantages of incremental method for Bayesian network learning in dealing the uncertainty to build a nonlinear prediction model for...
Aiming at embedded system's requirement of the wireless network application, this paper proposes a simple, reliable and practical transmission protocol. The protocol reserves all functions and high-efficiency character of UDP and realizes real-time and reliable transmission with reliable process flow, batch retransmit mechanism. Experiments showed that the proposed protocol could achieve high reliable...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.