The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Botnets are groups of compromised computers that botmasters (botherders) use to launch attacks over the Internet. To avoid detection, botnets use DNS fast flux to change the mapping between IP addresses and domain names periodically. Domain generation algorithms (DGAs) are employed to generate a large number of domain names. Detection techniques have been proposed to identify malicious domain names...
To meet the need of signal acquisition for Digital Radio Mondiale (DRM) equipment in communication security application, an embedded system is set up by combing signal acquisition and decoding module, host computer monitor module and PC104 bus control module, taking advantage of high data transmission efficiency on PC104 bus. Signal data is acquired and decoded by signal acquisition and decoding module...
A generalization of the fast coding method for efficient data hiding has been proposed. In this way, each secret digit in a prime-base notational system is represented by a series of cover values. Modification on one cover value can be used to embed several secret digits, so that distortion is observably reduced. The original fast coding method can be viewed as a special case of the generalized scheme...
Combining the rough set theory with hierarchic analysis model in view of their characteristics and introducing the definition of importance into non-core attributes, a new data reduction algorithm is proposed using a simple discriminative matrix. The validity and completeness of the algorithm is proved, by which the problem of index reduction for information systems security risk assessment is successfully...
Basing on the discourse about traditional model of the securities markets pricing mechanism, and considering the reality of the "absence of the liquidity supplier" in our country's security markets, this paper works out a dynamic stochastic matching pricing model basing on Markov tactics of the traders. And by the empirical testing, it vitrifies the basic hypotheses of the model.
After systematic analysis of risk factors of information security and assessment process, a quantitative security assessment method is presented based on fuzzy number operations. Both the fuzziness of the indices and the uncertainty of weight determination are considered. Then the grades of fuzzy language variables are given, and the opinions of multi experts are integrated to triangular fuzzy numbers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.