The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Danger Theory is a method of biological immunology. It presents an effective method to reduce false positive and improve the efficiency of AIS. Cloud model is an effective tool to transform qualitative concepts into quantitative expressions for uncertain problems. Change is potential causes of system imbalance, and is the basis and sample for danger analysis. This paper uses the concept of Cloud model...
The producing mechanism for danger signals is the most important in the danger theory used in AIS. To determine whether a system is "dangerous" needs more considerations. This paper uses the cloud model to describe the changes of system continuous parameters. For discontinuous change parameters, we use the changes of each parameter as a separate danger signal. The continuous and discontinuous...
This paper studied the problems of parameter system construction for large-scale Internet of Thing situation assessment. It also states the research of situational awareness and assessment of IP network briefly, the situation assessment differences between Internet of Thing and IP network are dicussed, for some especial aspects and the significance about large-scale Internet of Thing situation assessment...
Trust in Peer to Peer network has the fuzzy feature, and thus it cannot be described and handled using distinct mathematic model. To solve the problem, based on the advantage of using intuitionistic fuzzy theory to handle vague information, we propose a novel P2P trust model named IFTM (Intuitionistic Fuzzy theory based Trust Model), which uses membership, nonmembership and hesitancy degree to describe...
As an important method to analyze the security status of computer network, generating of network attack graph is a hot topic in this domain. After analyzing network security attributes including the host, user privilege, connection relation, etc., the model of computer network security status space is built. The node of attack graph expresses the network security status, and the directed-line expresses...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.