The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
According to the characteristics of electronic evidence generated by malicious codes, a weighted FP-Growth frequent pattern mining algorithm was proposed for malicious code forensics. Different API call sequences were assigned different weights according to their threaten degree to obtain frequent patterns of serious malicious codes and more accurate analysis results. Based on the weighted FP-Growth...
Training is an effective means to improve political, cultural and managing levels of specialized university administrative staffs. The training pertinence, effectiveness and practicability can be enhanced by innovating training mode of university administrative staffs and carrying out features analysis and scientific classification about the trainees, training materials and methods.
Based on the perfection of a series of management system involving the development plan of teaching faculty, the introduction of high-level talents, and faculty training at higher educational institutes, this article mainly explores the systematic, forward-looking, and meticulous principle by which to build up a system of teaching faculty construction, as well as its ensuing feedback and modification...
Training is an effective means to improve political, cultural and managing levels of specialized university administrative staffs. We can raise the training pertinence, effectiveness and practicability by innovating the training mode of university administrative staffs, such as analyzing the features of the trainees, training materials and methods and categorizing them into scientific classification.
In this paper, intrusion detection approaches for relational database systems were studied. An immune based intrusion detection algorithm for relational databases was proposed. According to the algorithm, the data to be detected were encoded into binary strings after preprocessing. The philosophy of negative selection in biological immune systems was utilized to generate immune detectors. Intrusion...
As a copyright protection technique, digital watermarking has arisen more and more attention from the public. It has been widely applied to copyright protection of multimedia data (images, video and audio). The increasing use of relational databases also calls for the need of applying the technique to databases in order to protect the copyright. With the development of digital watermarking technique...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.