The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Phylogeny model inference plays an important role in malware forensics. It aims at revealing the evolutionary relationship among malware instances. It is expected to be helpful for uncovering the trends of malware evolution and establishing a principled naming scheme. Although tree-based models are the mainstream direction, they are not suited to represent the reticulation events which are occasionally...
The three dimensional spatial analysis applications of three dimensional GIS in Geology include slice up, palisade map constructing, virtual pit excavation, tunnel simulation etc. At present, these geological spatial analysis applications are implemented by distinct algorithm in different systems. However, those can come down to three dimensional Boolean operation between two spatial entities. Light...
It is very important in theory and application to evaluate credibility of trust model. Although many application models are carefully analyzed, designed and implemented, there exist some faults yet. In this paper we studied trust relationship of agents, proposed a credibility calculation model among entities and gave their complete calculation method. It considered dynamic changes of trust relationship...
Trusted computing is an important research field in information security and trust evaluation for trust model is the key issue to be resolved. It is great significance for ensuring security of trust model for trusted computing to analyze normally and verify in design process of application model for trusted computing and analyze its trust in theory. In this paper the problems of security and trust...
With the growth of network in size and complexity, the isolated security systems are facing many challenges and they can not meet users' needs. As a new type of network, trusted network can make up for security defects of traditional network, change from passive recovery to active attack and end vicious network behaviors from head. Researching trusted network model is popular nowadays. Based on BLP...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.