Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The characteristic of data stream is that it has a huge size and its data change continually, which need to be responded quickly, since the times of query is limited. The continuous query and data stream approximate query model are introduced in this paper. Then, the query optimization of data stream and traditional database are compared. Finally, technology of continuous query optimization over data...
Material service safety is very important for public security. Researchers and engineers have devoted themselves to establishing models for material service behavior. Utilizing these models to predict material service behavior and assess service safety is an efficient and idealized way. However, material service behavior is quite complicated. Only simple material behavior models have been established...
A risk situation evaluation model for network security is proposed based on analyzing security threat status. This method first perceived and identified the characteristics of critical risk factors, such as asset, vulnerability and threat, from multi-security-sensors. Then a quantitative evaluation algorithm was presented to estimate current threats and potential threats. By analyzing their threat...
A visual cryptography scheme (VCS) for general access structures is a method to encode a secret image into n shares for n participants. Only qualified subsets of participants can recover the secret image. The yet known schemes omitted the deference between primary information and secondary one in secret image, and its best known upper bound on the share size is exponential. Besides its information...
We introduce the problems existed in the traditional networks, analyze the reasons of causing these network problems and pint out the key reason is that there is permeable vulnerabilities in the network system. The concepts and the attributes of tru-network are given. The tru-network is that the behaviors and the results of network are predictable. The three attributes of tru-network are trustworthiness,...
To make a long-term dynamic monitoring to the chronic illness, especially patients of HBV, we build a novel applied medical information system for chronic viral hepatitis (MISCHV). The distributed system architecture and its function are described, and the security components of availability, integrity and confidentiality are taken into account as main vectors when designing this medical database...
This paper firstly introduced the traditional LSB information hiding scheme, then proposed an improved LSB algorithm. This algorithm implements the information by many kinds of transformation. Theoretical analysis and experimental results demonstrate that the information hiding scheme can effectively resist both RS and statistics analyses, and improve the security of traditional LSB scheme.
Intrusion detection plays an important part in network security today. BP algorithm which is an algorithm in artificial intelligences can also be used in IDS. This paper make use of improved BP algorithm compared to the traditional one, the new algorithm brings us higher speed in constringency and more precise in detection .The new algorithm solves the difficulties of real-time system.
In this paper, we propose a new strong designated verifier ID-based ring signature scheme. The proposed scheme provides a way to generate a signature to only a designated verifier anonymously by one of the ring members. Except for the verifier, no one knows that the signature is generated by a ring member or the designated verifier. We show that our scheme can satisfy all the strong designated verifier...
In mobile ad hoc networks (MANETs), a single certificate authority (CA) node could be a security bottleneck. Multiple replica of CA is fault tolerant, but the network is as vulnerable as single CA or even worse since breaking one of the CAs means breaking all of them. Many distributed CA models based on the secret sharing scheme are proposed. In this paper, the suitable construction of the distributed...
Intrusion detection has become the important component of the network security. Many intelligent intrusion detection models are proposed, but the performance and efficiency are not satisfied to real computer network system. This paper extends these works by applying a new high efficient technique, named twin support vector machines (TWSVM), to intrusion detection. Using the KDD'99 data set collected...
The paper puts forward the basic theory and concept of intrusion detection and discusses the essential principle of intrusion detection technology, especially discusses the technology based on statistic model. At the same time, a basic structure of abnormal intrusion detection system has been designed in the paper. According to the probability theory, a new abnormal intrusion detection algorithm model...
Classification of intrusion attacks and normal network traffic is a challenging and critical problem in network security. Many classification methods for intrusion detection have been proposed, but there are few algorithms that are capable of distinguishing among the various attacks and normal connections effectively. This paper presents an effective intrusion detection algorithm based on conscientious...
The context transfer can improve handover performance effectively through avoid performing the entire protocol exchange with the mobile nodes from scratch, so it have received a lot of attention recently. This paper introduced the present research situation of context transfer, and proposed a security context transfer method for integrated space network, that enables authorized security context transfers...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.