The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Software risk management is an important approach to obtain trustworthy software. In this paper, entropy was applied to uncover the reasons of chaos and gave the mechanism of risk management in development life cycle. Information entropy was introduced to assess risk uncertainty and a three-dimension risk assessment was obtained through a questionnaire survey. The finding of the study shows the necessity...
Network security situational awareness(NSSA) has been a hot research spot in the network security domain. In this paper, a quantification method for NSSA based on conditional random fields(CRFs) was proposed. The data of network attacks from intrusion detection system (IDS), the hosts' vulnerabilities and the hosts' states were firstly combined as the network security factors. And then the network...
The growing demands for the trustworthiness of software pose an unprecedented challenge to software industry. An integrated trustworthy software process model is proposed to help improve software process risk management towards trustworthy software, which contains risk management, development process management and deliverables monitoring. Furthermore, based on this process model, a model framework...
This thesis puts forward a method of CRFs (Conditional Random Fields) based on feature sets in network intrusion detection. This method takes advantages of the CRFs models which can stitch to sequence data marking and add random attributes. It uses varied connection information and its relativity in network connection information data sequence as well as the feature sets relativity to attack detection...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.