The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Attack graphs are important tools for analyzing network security vulnerabilities. Recently, the generation method of attack graphs is a hot topic to the security researchers. As previous works encounter the scalability problem and inaccurate input information problem, we propose a novel method to automatic construction of attack graphs based on probability. After introducing prior-probability, match-probability,and...
For assessing the security and optimal strengthening of large enterprise networks, this paper proposes a new approach uses configuration information on firewalls and vulnerability information on all network devices to build defense graphs that show the attack and defense strategy. Some models including a defense graph model, attack-defense taxonomy and cost quantitative model, and Attack-Defense Game...
This paper attempts to model pervasive computing environments as a user-centric ldquoSmartShadowrdquo using the BDP (belief-desire-plan) user model, which maps pervasive computing environments into a dynamic virtual user space. SmartShadow will follow the user to provide him with pervasive services, just like his shadow in the physical world. In the BDP model, desires of a user are inferred from his...
Quantitative dual energy computed tomography (DECT) allows to obtain both density and atomic number and thus can provide information about material composition. In this paper, a DECT reconstruction method for high energy X-rays (1 ∼ 10MV) is proposed based on a basis material decomposition model. Our method is to be adapted for cargo inspection. The difference from conventional DECT methods is derived...
Hydraulic system is the important component of missile armament system, and its performance has determined the viability and reliability of the armament system. So it is very significant to diagnose its faults during its working period. But it will cause the substantive training expense to carry out the study in the actual equipment, and it is disadvantageous to the study of fault diagnosis technique...
With the development of modern military technology, uncertain decision-making problems become more and more exigent to be solved in military command and control. Based on game theory, and taking air formation to ground attack-defends campaign as the background, this paper establishes an opposed dynamic decision-making model. As to the problems in military decision-making in uncertainty, this paper...
Nowadays, workflow modeling and analysis has become the focus of study with growing demands on business process management (BPM). In this paper, after defining basic elements (task, user, resource and constraint) of business process, then we propose a formal modeling method of unified business process based on the process algebra language-Pi calculus, integrating tasks, users and resources. Besides...
High-resolution satellite images (HRSI) at sub-5m footprint such as IKONOS and SPOT-5 HRG/HRS images are becoming increasingly available to the earth observation community and their respective clients. SPOT-5 imagery is one of the main data sources for the project of West China topographic mapping (WChTM) which has been approved by the State Council of China in year 2006. In this paper, we present...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.