The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In today's world of fast communication, to insure, the security and integrity of information is a big challenge. Data hiding also known as Steganography is one of the fields that deal in methods related information security and hide secret information and message other information. This paper elucidates the effect of data hiding in different number of least significant bits in the primary colors of...
Cyberspace is a complicated system of computer, network and other information environments. To evaluate its security defence ability, the offensive and defensive features in cyberspace were discussed in this paper, firstly. Then index system and evaluation model were proposed. Based on analytic hierarchy process method, cyberspace security defence system was decomposed from its ability aspect. Fuzzy...
Batch recall is a practically important problem for most industry manufacturers. The batches of products which contain flawed parts need to be recalled by manufacturers in time to prevent further economic and health loss. Accurate batch recall could be a challenging issue as flawed parts may have already been integrated into a large number of products and distributed to customers. The recent development...
Virtualization has been widely adopted in current computer systems. A key part of virtualization is a hyper visor, which virtualizes physical resources to be shared among multiple guest virtual machines (VMs). Configuration files and security policy files used by the hyper visor control VMs' behavior. If these critical files are tampered with, all the VMs that run on the same hyper visor will be affected...
Network is an interconnected system of living or non-living things. In broadcasting communication system, group of broadcasting stations transmits the same programs “the networks compete to broadcast important events”. MANET Stands for “Mobile Ad Hoc Network.” Mobile ad hoc wireless network can change its locations and configure itself on the fly. It communicates with other network via wireless medium...
Estimating which nodes in a network are the infection sources, including the individuals who started a rumor in a social network, the computers that introduce a virus into a computer network, or the index cases of a contagious disease, plays a critical role in identifying the influential nodes in a network, and in some applications, limiting the damage caused by the infection through timely quarantine...
Cloud computing is a promising computing model that enables convenient and on-demand network access to a shared pool of configurable computing resources. The first offered cloud service is moving data into the cloud. data owners let cloud service providers host their data on cloud servers and data consumers can access the data from the cloud servers. This new paradigm of data storage service also...
MILS (Multiple Independent Levels of Security and Safety) is a high-assurance architecture for secure sharing of different security-level information. But the MILS security evaluation is facing a great challenge. Traditional Common Criteria (CC) method is not suitable for MILS system evaluation for its complexity, time consuming and qualitative description. To achieve quantitative security assessment,...
The electric power system is a complex system, whose operating condition may not remain at a constant value. This necessitates the power system operator be alert to keep the system performance under normal condition. The various contingencies like, large load variations, outage of components (transmission lines, transformers, generators, etc.) are more common. Any of these conditions causes overloads...
A fuzzy comprehensive evaluation method of user experience is proposed to the problem on user experience quality which is difficult to accurately evaluate on the E-commerce web using. Firstly, being accordance with usability testing theory and the analysis of the user experience elements on E-commerce web using process, a evaluation index architecture is structured with views including human-computer...
With the rapid development of industrialization and urbanization, the security situation faced by our country is more severe and complex. In the field of the social security prevention and control, various safety and security measures and installations have come into full play, but in them, there are some weak points, such as improper designs and the separation of people's prevention from the material...
Aiming to solve the problem of network security evaluation index, the data extracted from net flow are analyzed. And the data are aggregated by several relational dimensions. Using the method of grey relation advantage analysis, the grey relation values of network security events and the characters of the data are calculated. The pivot characters representing the events were decided. Then a set of...
The first and second layer factors of a host risk on the network is designed and a factor system of the network risk evaluation is built in the paper. To achieve the quantitative evaluation for host risk on the network, the improved AHP method is used as well as experiment is carried out. Finally, it indicates that this approach is able to quantitatively show the host risk on the network.
The study extends the original technology acceptance model (TAM) by applying it to the purchase intention of home security and remote control equipments, and introducing two external variables, ??task-technology fit?? and ??reliability and interaction.?? The paper addresses the original cognitive TAM variables, and then revises them by adding emotional antecedents which fit into consumer context....
From the structure, functions and characteristics of office network, the threat and attack are analyzed. Office network is divided into network level, system level and application level. Using the primary components and factor analysis (PCFA), all levels' relationship and security strategy and realized way are elaborated. Different security strategy is applied reasonably. Based on PCFA and through...
Since attack graphs provide practical attack context and relationships among vulnerabilities, researchers have been trying to evaluate network security based on attack graphs. However, previous works focus their attention on specific evaluations they concerned, and each does things in his own way. There is no explicit way telling network administrators how to measure network security in a general...
"Botnet" is a network of computers that are compromised and controlled by an attacker. Botnets are one of the most serious threats to today's Internet. Most current botnets have centralized command and control (C&C) architecture. However, peer-to-peer (P2P) structured botnets have gradually emerged as a new advanced form of botnets. Without central C&C servers, P2P botnets are more...
Customers always complain that anti-virus softwares bog down their computers by consuming much of PC memories and resources. With the popularity and variety of zero- day threats over the Internet, security companies have to keep on inserting new virus signatures into their databases. However, is the increasing size of the signature file the sole reason to drag computers to a crawl during the virus...
The evaluation system is developed for network attack effect in this paper, and present the process from launching an attack to the result of evaluation being outputted. Based on an evaluation index system suitable for the system, we analyses some theories and methods respectively which are adopted to realize their functions by the main modules. Synthesis account of evaluated effect is conducted with...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.