The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Determining threshold values of key economic security indices describing an economic situation in any country is an important stage in the assessment of the country's economic stability. Threshold values must be periodically reevaluated due to their continuous deterioration as far as the global economic environment is undergoing changes. The authors offer a rough estimate method for achieving this...
This study is aimed at determining the future share net inflows and outflows by using the characteristics of Exchange Traded Funds (ETF) as variables in a data mining based analytic methodology. The relationship between net flows is closely related to investor perception of the future and past performance of mutual funds. In order to explore the relationship between investor's perception of ETFs and...
A set of indexes for evaluation is a basic requirement for carrying out the evaluation successfully to protect telecom data network. How to extract useful indexes is a main problem to solve in this paper. The ITU-T X.805 is the basis of the analysis. The general framework is combined with the structure of China telecom data network. Then through determining key assets of the evaluation objects and...
Situation element extraction is a significant step of network security situation awareness. This paper presents a network security situation element extraction model based on projection pursuit regression. A nonlinear optimization problem is proposed in the model, in which the projection direction and the polynomial coefficients are optimization variables, and projective index function is target function...
This paper studied the problems of parameter system construction for large-scale Internet of Thing situation assessment. It also states the research of situational awareness and assessment of IP network briefly, the situation assessment differences between Internet of Thing and IP network are dicussed, for some especial aspects and the significance about large-scale Internet of Thing situation assessment...
Windows registry from physical memory contains lots of important information that are of potential evidential value in forensic analysis. In this paper, a method of extracting windows registry information from physical memory has been proposed. The algorithm for extracting the hive files from memory is presented and mainly composed of the following steps: judging the version of operating system, acquiring...
A novel method for embedding a covert message in cover audio for secure communication is proposed. The covert message to be embedded can be of any format. In this process, two cover audio files are taken and difference of the amplitude values is calculated. These differences are then classified into number of ranges and are substituted with a new value to embed the secret message. The embedded secret...
Aiming at the shortages of the existing data-mining model for forecasting the industry security, a classification model based on rough sets and BP neural network (BPNN) is put forward in this paper. First, the theory of rough set is applied to pick up and reduce the index attributes. Then, the training samples are sent to the BPNN to train and learn. After that, the sorts of the coal industry security...
Wireless networks and mobile devices, which had brought lots of convenience to our daily life and made us much easier to get information any time and any where, now had motivates the needs for efficient tools analyzing data streams. Data mining technology turned into a valid tool for us to make scientific decision. Data mining can transform vast data resource into available knowledge and information...
In order to solve the problem of taxonomies overlap in software vulnerability, a method of vulnerability classifying based on text clustering in NVD (National Vulnerability Database) is proposed, and Cluster Overlap Index is used to evaluate Simplekmean, BisectingKMeans and BatchSom clustering algorithms. 45 main vulnerability clusters are selected from approximate 40,000 vulnerability records according...
Packet classification has been widely used in network security protection. A number of the major techniques for network security protection, such as virtual private networks (VPN), firewalls, and network intrusion detection systems (NIDS), are all dependent on the speed and ability of packet classification. The complexity of multi-dimensional packet classification will result in large scale rule-sets,...
Grain security is the premises of continuous development for a country, and it has been a global problem. There is a very important meaning to study and formulate new grain security evaluation indexes system and evaluation methods. Principal components analysis (PCA) is a multivariate statistical technique that can be used as a data exploration tool, both by classifying participants and simplifying...
Putting investment in real estate or in stock? It is a hard decision for the investors to make. So based on the data from the year 1998 to 2007, this article sets up a gray-situation decision model, which shows that in the past 10 years the strategy of investing in real estate is the best, better than investing in stock and than investing in both simultaneously. This article believes that it is not...
There are some weaknesses in the traditional safety evaluation methods, such as, slow reasoning, low accuracy and so on, so thinking of a variety of factors which affect gas safety, a gas safety evaluation index system is built, which focuses on the state of gas, mine ventilation, gas monitoring, safety management and kindling. Combining the fuzzy comprehensive evaluation method with gray correlation...
The first and second layer factors of a host risk on the network is designed and a factor system of the network risk evaluation is built in the paper. To achieve the quantitative evaluation for host risk on the network, the improved AHP method is used as well as experiment is carried out. Finally, it indicates that this approach is able to quantitatively show the host risk on the network.
Various cryptographic puzzle schemes are proposed as a defense mechanism against denial of service attack. But, all these puzzle schemes face a dilemma when there is a large disparity between the computational power of attackers and legitimate clients: increasing the difficulty of puzzles might unnecessarily restrict legitimate clients too much, and lower difficulty puzzles cannot sufficiently block...
Based on post-WTO sample data, this paper investigates the interaction among commodity price index, PPI and CPI after China has entered World Trade Organization (WTO) and fulfilled its promise of opening certain sectors. Granger casualty test is employed to conduct this research and the test result shows that the most international commodity price index, Rogers International Commodity Index (RICI),...
Audit logs are very important part of any secure system and should be highly considered. The content of them which is past events is so sensitive and poses a threat to privacy and information security, so should be protected against any illegal reading and modification. The best way to do this is encryption. Important challenges in an encrypted audit log are speed of log and search process, correctness...
This paper proposes a composite security index for the on-line critical contingency selection and ranking in terms of both the line flow and bus voltage limit violations. In order to evaluate the vector valued security index, a scalar index is derived based on the concept of hyper-ellipse inscribed within a hyper-box. The proposed index, which provides an efficient method for filtering and ranking...
Combining the rough set theory with hierarchic analysis model in view of their characteristics and introducing the definition of importance into non-core attributes, a new data reduction algorithm is proposed using a simple discriminative matrix. The validity and completeness of the algorithm is proved, by which the problem of index reduction for information systems security risk assessment is successfully...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.