The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Feature location is the activity of identifying an initial location in the source code that implements special functionality in a software system. Existing techniques for feature location broadly fall into three categories, based on the type of information they use: text, static, and dynamic. The techniques based on dynamic may generate large amount of data and is difficult to utilize. This paper...
When auditing the large enterprise groups with many accounting subjects, in order to find. the doubtful auditing points quickly in the mass electronic data, we designed and developed a accounting report procedure for single subject according to the logic of balance sheet with the parallel simulation; adopted the associative rules to mine the audit features of electronic data, and combined with the...
P2P worms have posed heavy threat to P2P networks. In this paper, we address the features of reactive worm propagation and further model propagation of reactive worms in applying epidemiology. Based on the analysis of the model presented, we obtain a condition for the global stability of the worm free equilibrium. The model and the condition are validated through large scale simulations, which show...
Attack graphs are important tools for analyzing network security vulnerabilities. Recently, the generation method of attack graphs is a hot topic to the security researchers. As previous works encounter the scalability problem and inaccurate input information problem, we propose a novel method to automatic construction of attack graphs based on probability. After introducing prior-probability, match-probability,and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.