The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
More and more netizens prefer to comment on social hot issues today and their views become very useful for government decision-making. Specially, news and related comments often influence decision behavior of officers. However, it becomes a key problem to analyze them automatically in order to provide references for decision-making. One of effective way is to cluster news comments. In this paper,...
Since attack graphs provide practical attack context and relationships among vulnerabilities, researchers have been trying to evaluate network security based on attack graphs. However, previous works focus their attention on specific evaluations they concerned, and each does things in his own way. There is no explicit way telling network administrators how to measure network security in a general...
Attack graphs are important tools for analyzing network security vulnerabilities. Recently, the generation method of attack graphs is a hot topic to the security researchers. As previous works encounter the scalability problem and inaccurate input information problem, we propose a novel method to automatic construction of attack graphs based on probability. After introducing prior-probability, match-probability,and...
Both software and hardware of computer systems are subject to faults, however, traditional approaches, ignoring the relationship between software faults and hardware faults, are unavailable for analyzing complex software and hardware faults. This paper proposes a systematic framework to analyze correlative software and hardware fault. It includes two associated processes, module level analysis and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.