The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the rapid development of social media, now massive data are produced every day. We need to know about users' view and comment on a hot event so that the government and relevant departments can control and guide public opinion, and people can have a correct understanding of the event. So it is necessary to analyze these data. While it is difficult to dig out sufficient information from these data...
After studying the current principle andarchitecture of antivirus gateway for Web security detection, we found that the conventional virus scan is based on filescanning, which takes significant processing time. Whenscanning big size files, it may often cause disconnection of filetransferring with a time-out error message prompted out. Tosolve the problem of slow file virus scan, we propose a newmethod...
In order to improve the precision of network security situation prediction, a combined method for prediction was proposed. For the nonlinearity of network security situation value, the Method predicted the security situation by using ARMA model and Markov model. On this basis, it optimized the predicted results with combined strategy. The analysis of the example indicates that the combined method...
Utilizing computer aided security risk assessment, administrators can apperceive network security situation quickly and take countermeasures effectively. Most assessment methods disregard the dependencies among services, lack the evaluation against indirect risks, and seldom mention the composition of multiple source risks. Regarding the above problems, an assessment method that based on service dependency...
Wireless Sensor Networks (WSN) represent a new dimension in the field of networking. In this paper, an improved Genetic Algorithm is applied to the design of high performance multi-path routing protocol of WSN at the first time. The Algorithm consists of two stages: single-parent evolution and population evolution. The initial population is formed in the stage of single-parent evolution by using gene...
Traditional methods for evaluating network security neglect the correlation of network vulnerabilities. To solve this problem, a method based on Colored Petri Net (CPN) modeling is presented. Potential attack sequences are built according to the correlation of network vulnerabilities. The weakness and key paths can be found through analyzing the attack sequences. Simulation results show that the proposed...
Network threat assessment is an important branch of information security assessment. Its research involves data fusion and data mining. This paper provided an overview of related research efforts in the area of network threat assessment. It presented a network threat assessment framework, and demonstrated a computational approach based on attribute recognition theory. In the computational example,...
It's necessary to create a credible and general evaluating index model in network threat assessment. According to the network indices' effect, this paper proposed an algorithm which combines grey correlation degree in grey theory with traditional analytic hierarchy process (AHP) to determine the indices. It considered both objective and subjective factors. Experiments showed that this method had a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.