The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The security situation of China's futures industry is currently in good condition on the whole, with strong industrial competitiveness and control force, as well as low external dependency. However, under the new normal, there still exist some problems, such as fewer trading varieties of futures, irrational investor structure and the slow internationalization process and so on. So we must accelerate...
Recent advances in Intrusion Risk Assessment (IRA) have brought promising solutions to enhance Intrusion Response Systems (IRS). However, current researches lack reasonable solutions to exploit system state information. Without the system state, the IRA results may suffer from the high false rate of Intrusion Detection Systems (IDS). To address this limitation, we propose a novel State-Aware Risk...
In this paper, we investigate detectability and identifiability of attacks on linear dynamical systems that are subjected to external disturbances. We generalize a concept for a security index, which was previously introduced for static systems. The index exactly quantifies the resources necessary for targeted attacks to be undetectable and unidentifiable in the presence of disturbances. This information...
To vary and improve risk assessment method of port facility security, a new risk assessment approach based on a comprehensive model (DHGF model) is developed, which integrates the Delphi method, the analytic hierarchy process (AHP), grey theory and fuzzy evaluation method. A comprehensive evaluation to the target port facility on security is obtained from qualitative analysis to quantitative analysis...
China Southern Power Grid Company (CSG) and eMIT, LLC recently developed and implemented an online risk-based security assessment system-Probabilistic Security Risk Assessment (PSRA). PSRA calculates the probability of undesirable events in the transmission system and evaluates their corresponding severities. PSRA combines the probability measure of each undesirable event with the consequence measure...
the safety assessment index system is established on the elements of mobile payment system and hierarchical structure of software risk assessment. In order to make up for the deficiencies of traditional risk methods and adapt to fuzzy description in mobile payment system, the hierarchical safety assessment model is developed with the extension theory as the core. The extension method converts the...
The risk assessment approach has been widely used in power system for it has more advantages than traditional certainty approach and probability approach, such as, it can calculate two important indexes at the same time, the probability index of accident occuring and the serious loss index which result from the accident. This paper begins with a introduction of the fault probability model and the...
Private Offered Fund develops very rapidly in China, it has become a very important part of financial market. It has important insignificant that study the risk system to steady the financial market of China. In this research, we established system of risk assessment of private offered fund in China and assessed the risk level of each indexes by using AHP-Fuzzy Comprehensive Evaluation Methods. The...
On the basis of determining the space scale of the regional risk assessment recognized and analyzed the risk source with the systematic engineering principles and methods, and set up a fuzzy comprehensive evaluation system. And then set up the evaluation system of Petrochemical Area in Huang Dao by using fuzzy comprehensive evaluation and MATLAB and GUI technology, and it will supply technical support...
Currently, information appears on the business environment as an active creator of value and benefits [8]. The heavy use of computing resources to process and store the information has heightened the dependency of organizations regarding to their IT infrastructure. This becomes critical when we know that all systems have vulnerabilities that could jeopardize the entire business activity. So, despite...
This paper systematically studies various factors of the regional risk of group events from the view of society development with integrated management theory, and an index system of comprehensive evaluation on the regional risk of group events is set up. A method of comprehensive evaluation on the regional risk of group events is designed based on Fuzzy AHP synthetic evaluation. And the practicability...
This paper proposes the approach of analyzing risk of deep excavation engineering based on fuzzy theory. By using fuzzy mathematical method, the risk assessment model is established, and a practical method on fuzzy comprehensive assessment on risk of deep excavation engineering is proposed, and the practicability of this method is verified in a real engineering projects.
Accounting information system risk analysis and assessment is of more importance in enterprise. In this paper, analytic hierarchy process method and fuzzy comprehensive evaluation model are combined to assess the risk of accounting system. In this way, complex risk factors can be analyzed systematically as while as risk Level can be analyzed quantitatively which is fuzzy. And practice proves that...
Assessing the third-party payment risk is to use scientific methods and forecast risk, which could provide executive scientific basis. Qualitative analysis and quantified analysis are dialectical and unified. To analyze the third-party payment risk assessment with the methods of AHP and vague general evaluation model, the third-party payment business is showed as an example for research. The conclusions...
Many researchers have studied the multi-period shortfall-risk minimizing hedging problem under jump-diffusion settings, however, up to now, there has not been many literatures to directly present the analytic solution for such a hedging problem. In this paper, defining the terminal shortfall as hedging risk, we research the minimal shortfall-risk hedging problem of European option by means of MCMC...
Mobile ad-hoc networks (MANET) has highly dynamic topology, open access of wireless channel and unpredictable behaviors, however, absence of effective security mechanism render MANET more vulnerable to positive attacks. Conventional assessments always require large sample data satisfy specific distribution and establish models through subjective recognition, thus lack common applicability, objectivity...
The indices system of risk review and a multi-level fuzzy synthetic evaluation model of virtual enterprise based on entropy-weighted were established. Not only make full use of the indices information. But also avoided subjective sense of weight-coefficient,and it mends the shortage of traditional synthetic evaluation methods. The practicality and reliability of the method is demonstrated in a example.
A new index system of commercial bank liquidity stress testing is set up after cluster analysis of R type. And then the index weight is determined by entropy method. Commercial bank liquidity risk is rated. Taking 14 listed banks for example, rating liquidity risk. The innovative feature of this paper: Firstly, observable indices replace unobservable ones, it is feasible for banks to ensure liquidity...
In this paper, university network security evaluation system based on fuzzy AHP evaluation model, with examples given using the evaluation model for network security assessment procedures and methods. Evaluation results show that the proposed approach is feasible and guidance.
In order to reduce the financial risks of Oversea Merger and Acquisition, and determine the best loan credit structure model for Overseas Merger and Acquisition project, a novel loans credit evaluation model of Overseas Merger and Acquisition project based on Analytic Hierarchy Process was proposed in this paper. During the implementation period of Overseas Merger and Acquisition, a comprehensive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.